Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
L363rVr7oL.exe

Overview

General Information

Sample name:L363rVr7oL.exe
renamed because original name is a hash value
Original sample name:2162d29eb849e9c799f3a951e52c9d4d.exe
Analysis ID:1580557
MD5:2162d29eb849e9c799f3a951e52c9d4d
SHA1:386cb6a7cf616dbce0823f6ff23c1cbcb1d302e5
SHA256:150046fc66a80e4668fc08417e422c5f97489831823c898b50ca4ed6bc5a6f12
Tags:exenjratRATuser-abuse_ch
Infos:

Detection

Njrat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Njrat
.NET source code contains potential unpacker
AI detected suspicious sample
Connects to many ports of the same IP (likely port scanning)
Contains functionality to disable the Task Manager (.Net Source)
Contains functionality to spread to USB devices (.Net source)
Disables zone checking for all users
Drops PE files to the startup folder
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies the windows firewall
Uses netsh to modify the Windows network and firewall settings
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates a window with clipboard capturing capabilities
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the program root directory (C:\Program Files)
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May infect USB drives
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Startup Folder File Write
Stores files to the Windows start menu directory
Uses 32bit PE files
Yara signature match

Classification

  • System is w10x64
  • L363rVr7oL.exe (PID: 5480 cmdline: "C:\Users\user\Desktop\L363rVr7oL.exe" MD5: 2162D29EB849E9C799F3A951E52C9D4D)
    • server.exe (PID: 3272 cmdline: "C:\Users\user\AppData\Local\Temp\server.exe" MD5: 2162D29EB849E9C799F3A951E52C9D4D)
      • netsh.exe (PID: 6520 cmdline: netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\server.exe" "server.exe" ENABLE MD5: 4E89A1A088BE715D6C946E55AB07C7DF)
        • conhost.exe (PID: 5180 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • netsh.exe (PID: 4340 cmdline: netsh firewall delete allowedprogram "C:\Users\user\AppData\Local\Temp\server.exe" MD5: 4E89A1A088BE715D6C946E55AB07C7DF)
        • conhost.exe (PID: 6876 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • netsh.exe (PID: 6592 cmdline: netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\server.exe" "server.exe" ENABLE MD5: 4E89A1A088BE715D6C946E55AB07C7DF)
        • conhost.exe (PID: 6164 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • conhost.exe (PID: 2892 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • Explower.exe (PID: 6876 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe" MD5: 2162D29EB849E9C799F3A951E52C9D4D)
  • Microsoft Corporation.exe (PID: 1612 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe" MD5: 2162D29EB849E9C799F3A951E52C9D4D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
NjRATRedPacket Security describes NJRat as "a remote access trojan (RAT) has capabilities to log keystrokes, access the victim's camera, steal credentials stored in browsers, open a reverse shell, upload/download files, view the victim's desktop, perform process, file, and registry manipulations, and capabilities to let the attacker update, uninstall, restart, close, disconnect the RAT and rename its campaign ID. Through the Command & Control (CnC) server software, the attacker has capabilities to create and configure the malware to spread through USB drives."It is supposedly popular with actors in the Middle East. Similar to other RATs, many leaked builders may be backdoored.
  • AQUATIC PANDA
  • Earth Lusca
  • Operation C-Major
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.njrat
{"Campaign ID": "Kyotzin", "Version": "0.7d", "Install Name": "a4d560bc8f8d17c6ed1c6a55f7fdc2b2", "Install Dir": "system", "Registry Value": "Software\\Microsoft\\Windows\\CurrentVersion\\Run", "Network Seprator": "|'|'|"}
SourceRuleDescriptionAuthorStrings
L363rVr7oL.exeJoeSecurity_NjratYara detected NjratJoe Security
    L363rVr7oL.exeWindows_Trojan_Njrat_30f3c220unknownunknown
    • 0x115d2:$a1: get_Registry
    • 0x15a57:$a2: SEE_MASK_NOZONECHECKS
    • 0x156f9:$a3: Download ERROR
    • 0x15ca9:$a4: cmd.exe /c ping 0 -n 2 & del "
    • 0x13c36:$a5: netsh firewall delete allowedprogram "
    L363rVr7oL.exeCN_disclosed_20180208_cDetects malware from disclosed CN malware setFlorian Roth
    • 0x15ca9:$x1: cmd.exe /c ping 0 -n 2 & del "
    • 0x137c2:$s1: winmgmts:\\.\root\SecurityCenter2
    • 0x15717:$s3: Executed As
    • 0x124f0:$s5: Stub.exe
    • 0x156f9:$s6: Download ERROR
    • 0x13784:$s8: Select * From AntiVirusProduct
    L363rVr7oL.execrimeware_njrat_stringsDetects njRAT based on some stringsSekoia.io
    • 0x1549b:$: set cdaudio door closed
    • 0x1545f:$: set cdaudio door open
    • 0x15cbf:$: ping 0
    • 0x13412:$: [endof]
    • 0x132cc:$: TiGeR-Firewall
    • 0x132fa:$: NetSnifferCs
    • 0x132b8:$: IPBlocker
    • 0x13314:$: Sandboxie Control
    L363rVr7oL.exeNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
    • 0x15a57:$reg: SEE_MASK_NOZONECHECKS
    • 0x156dd:$msg: Execute ERROR
    • 0x15731:$msg: Execute ERROR
    • 0x15ca9:$ping: cmd.exe /c ping 0 -n 2 & del
    Click to see the 1 entries
    SourceRuleDescriptionAuthorStrings
    C:\Program Files (x86)\Explower.exeJoeSecurity_NjratYara detected NjratJoe Security
      C:\Program Files (x86)\Explower.exeJoeSecurity_NjratYara detected NjratJoe Security
        C:\Program Files (x86)\Explower.exeWindows_Trojan_Njrat_30f3c220unknownunknown
        • 0x115d2:$a1: get_Registry
        • 0x15a57:$a2: SEE_MASK_NOZONECHECKS
        • 0x156f9:$a3: Download ERROR
        • 0x15ca9:$a4: cmd.exe /c ping 0 -n 2 & del "
        • 0x13c36:$a5: netsh firewall delete allowedprogram "
        C:\Program Files (x86)\Explower.exeCN_disclosed_20180208_cDetects malware from disclosed CN malware setFlorian Roth
        • 0x13c88:$marker4: netsh firewall add allowedprogram
        • 0x13c36:$marker25: netsh firewall delete allowedprogram "
        • 0x15f6d:$key5: [PrintScreen]
        • 0x15cb9:$del3: /c ping 0 -n 2 & del
        • 0x13784:$sup2: Select * From AntiVirusProduct
        • 0x13604:$sup3: Software\Microsoft\Windows\CurrentVersion\Run
        • 0x136c2:$sup3: Software\Microsoft\Windows\CurrentVersion\Run
        • 0x142e2:$sup3: Software\Microsoft\Windows\CurrentVersion\Run
        • 0x14366:$sup3: Software\Microsoft\Windows\CurrentVersion\Run
        • 0x14ea6:$sup5: SOFTWARE\Microsoft\Windows NT\CurrentVersion
        • 0x150f8:$sup5: SOFTWARE\Microsoft\Windows NT\CurrentVersion
        • 0x156dd:$msg5: Execute ERROR
        • 0x15731:$msg5: Execute ERROR
        • 0x156f9:$msg6: Download ERROR
        • 0x157af:$msg7: Update ERROR
        • 0x157e9:$msg7: Update ERROR
        • 0x157c9:$msg8: Updating To
        • 0x15a57:$reg1: SEE_MASK_NOZONECHECKS
        C:\Program Files (x86)\Explower.exeCN_disclosed_20180208_cDetects malware from disclosed CN malware setFlorian Roth
        • 0x13c88:$marker4: netsh firewall add allowedprogram
        • 0x13c36:$marker25: netsh firewall delete allowedprogram "
        • 0x15f6d:$key5: [PrintScreen]
        • 0x15cb9:$del3: /c ping 0 -n 2 & del
        • 0x13784:$sup2: Select * From AntiVirusProduct
        • 0x13604:$sup3: Software\Microsoft\Windows\CurrentVersion\Run
        • 0x136c2:$sup3: Software\Microsoft\Windows\CurrentVersion\Run
        • 0x142e2:$sup3: Software\Microsoft\Windows\CurrentVersion\Run
        • 0x14366:$sup3: Software\Microsoft\Windows\CurrentVersion\Run
        • 0x14ea6:$sup5: SOFTWARE\Microsoft\Windows NT\CurrentVersion
        • 0x150f8:$sup5: SOFTWARE\Microsoft\Windows NT\CurrentVersion
        • 0x156dd:$msg5: Execute ERROR
        • 0x15731:$msg5: Execute ERROR
        • 0x156f9:$msg6: Download ERROR
        • 0x157af:$msg7: Update ERROR
        • 0x157e9:$msg7: Update ERROR
        • 0x157c9:$msg8: Updating To
        • 0x15a57:$reg1: SEE_MASK_NOZONECHECKS
        Click to see the 67 entries
        SourceRuleDescriptionAuthorStrings
        00000000.00000002.1704428155.00000000036C8000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_NjratYara detected NjratJoe Security
          00000000.00000002.1704428155.00000000036C8000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Njrat_30f3c220unknownunknown
          • 0x115f2:$a1: get_Registry
          • 0x15a77:$a2: SEE_MASK_NOZONECHECKS
          • 0x15719:$a3: Download ERROR
          • 0x15cc9:$a4: cmd.exe /c ping 0 -n 2 & del "
          • 0x13c56:$a5: netsh firewall delete allowedprogram "
          00000000.00000002.1704428155.00000000036C8000.00000004.00000800.00020000.00000000.sdmpNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
          • 0x15a77:$reg: SEE_MASK_NOZONECHECKS
          • 0x156fd:$msg: Execute ERROR
          • 0x15751:$msg: Execute ERROR
          • 0x15cc9:$ping: cmd.exe /c ping 0 -n 2 & del
          00000000.00000000.1677861095.0000000000082000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_NjratYara detected NjratJoe Security
            00000000.00000000.1677861095.0000000000082000.00000002.00000001.01000000.00000003.sdmpWindows_Trojan_Njrat_30f3c220unknownunknown
            • 0x113d2:$a1: get_Registry
            • 0x15857:$a2: SEE_MASK_NOZONECHECKS
            • 0x154f9:$a3: Download ERROR
            • 0x15aa9:$a4: cmd.exe /c ping 0 -n 2 & del "
            • 0x13a36:$a5: netsh firewall delete allowedprogram "
            Click to see the 3 entries
            SourceRuleDescriptionAuthorStrings
            0.0.L363rVr7oL.exe.80000.0.unpackJoeSecurity_NjratYara detected NjratJoe Security
              0.0.L363rVr7oL.exe.80000.0.unpackWindows_Trojan_Njrat_30f3c220unknownunknown
              • 0x115d2:$a1: get_Registry
              • 0x15a57:$a2: SEE_MASK_NOZONECHECKS
              • 0x156f9:$a3: Download ERROR
              • 0x15ca9:$a4: cmd.exe /c ping 0 -n 2 & del "
              • 0x13c36:$a5: netsh firewall delete allowedprogram "
              0.0.L363rVr7oL.exe.80000.0.unpackCN_disclosed_20180208_cDetects malware from disclosed CN malware setFlorian Roth
              • 0x15ca9:$x1: cmd.exe /c ping 0 -n 2 & del "
              • 0x137c2:$s1: winmgmts:\\.\root\SecurityCenter2
              • 0x15717:$s3: Executed As
              • 0x124f0:$s5: Stub.exe
              • 0x156f9:$s6: Download ERROR
              • 0x13784:$s8: Select * From AntiVirusProduct
              0.0.L363rVr7oL.exe.80000.0.unpackcrimeware_njrat_stringsDetects njRAT based on some stringsSekoia.io
              • 0x1549b:$: set cdaudio door closed
              • 0x1545f:$: set cdaudio door open
              • 0x15cbf:$: ping 0
              • 0x13412:$: [endof]
              • 0x132cc:$: TiGeR-Firewall
              • 0x132fa:$: NetSnifferCs
              • 0x132b8:$: IPBlocker
              • 0x13314:$: Sandboxie Control
              0.0.L363rVr7oL.exe.80000.0.unpackNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
              • 0x15a57:$reg: SEE_MASK_NOZONECHECKS
              • 0x156dd:$msg: Execute ERROR
              • 0x15731:$msg: Execute ERROR
              • 0x15ca9:$ping: cmd.exe /c ping 0 -n 2 & del
              Click to see the 1 entries

              System Summary

              barindex
              Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\server.exe, ProcessId: 3272, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-25T06:22:05.558040+010020211761Malware Command and Control Activity Detected192.168.2.449730147.185.221.2437290TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-25T06:22:05.558040+010020331321Malware Command and Control Activity Detected192.168.2.449730147.185.221.2437290TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-25T06:22:10.893760+010028255641Malware Command and Control Activity Detected192.168.2.449730147.185.221.2437290TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: L363rVr7oL.exeAvira: detected
              Source: C:\Program Files (x86)\Explower.exeAvira: detection malicious, Label: TR/Dropper.Gen
              Source: C:\Program Files (x86)\Explower.exeAvira: detection malicious, Label: TR/Dropper.Gen
              Source: C:\Program Files (x86)\Explower.exeAvira: detection malicious, Label: TR/Dropper.Gen
              Source: C:\Program Files (x86)\Explower.exeAvira: detection malicious, Label: TR/Dropper.Gen
              Source: C:\Program Files (x86)\Explower.exeAvira: detection malicious, Label: TR/Dropper.Gen
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeAvira: detection malicious, Label: TR/Dropper.Gen
              Source: C:\Program Files (x86)\Explower.exeAvira: detection malicious, Label: TR/Dropper.Gen
              Source: C:\Program Files (x86)\Explower.exeAvira: detection malicious, Label: TR/Dropper.Gen
              Source: C:\Users\user\AppData\Local\Temp\server.exeAvira: detection malicious, Label: TR/Dropper.Gen
              Source: C:\Notepad.exeAvira: detection malicious, Label: TR/Dropper.Gen
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeAvira: detection malicious, Label: TR/Dropper.Gen
              Source: C:\Program Files (x86)\Explower.exeAvira: detection malicious, Label: TR/Dropper.Gen
              Source: 0.0.L363rVr7oL.exe.80000.0.unpackMalware Configuration Extractor: Njrat {"Campaign ID": "Kyotzin", "Version": "0.7d", "Install Name": "a4d560bc8f8d17c6ed1c6a55f7fdc2b2", "Install Dir": "system", "Registry Value": "Software\\Microsoft\\Windows\\CurrentVersion\\Run", "Network Seprator": "|'|'|"}
              Source: C:\Notepad.exeReversingLabs: Detection: 86%
              Source: C:\Notepad.exeVirustotal: Detection: 77%Perma Link
              Source: C:\Program Files (x86)\Explower.exeReversingLabs: Detection: 86%
              Source: C:\Program Files (x86)\Explower.exeVirustotal: Detection: 77%Perma Link
              Source: C:\Users\user\AppData\Local\Explower.exeReversingLabs: Detection: 86%
              Source: C:\Users\user\AppData\Local\Explower.exeVirustotal: Detection: 77%Perma Link
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\History\Explower.exeReversingLabs: Detection: 86%
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\History\Explower.exeVirustotal: Detection: 77%Perma Link
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Explower.exeReversingLabs: Detection: 86%
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\Explower.exeReversingLabs: Detection: 86%
              Source: C:\Users\user\AppData\Local\Temp\server.exeReversingLabs: Detection: 86%
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeReversingLabs: Detection: 86%
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeReversingLabs: Detection: 86%
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeReversingLabs: Detection: 86%
              Source: C:\Users\user\Favorites\Explower.exeReversingLabs: Detection: 86%
              Source: C:\Windows\SysWOW64\Explower.exeReversingLabs: Detection: 86%
              Source: L363rVr7oL.exeVirustotal: Detection: 77%Perma Link
              Source: L363rVr7oL.exeReversingLabs: Detection: 86%
              Source: Yara matchFile source: L363rVr7oL.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.L363rVr7oL.exe.80000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.1704428155.00000000036C8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000000.1677861095.0000000000082000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: L363rVr7oL.exe PID: 5480, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: server.exe PID: 3272, type: MEMORYSTR
              Source: Yara matchFile source: C:\Program Files (x86)\Explower.exe, type: DROPPED
              Source: Yara matchFile source: C:\Notepad.exe, type: DROPPED
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exe, type: DROPPED
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, type: DROPPED
              Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\server.exe, type: DROPPED
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: C:\Program Files (x86)\Explower.exeJoe Sandbox ML: detected
              Source: C:\Program Files (x86)\Explower.exeJoe Sandbox ML: detected
              Source: C:\Program Files (x86)\Explower.exeJoe Sandbox ML: detected
              Source: C:\Program Files (x86)\Explower.exeJoe Sandbox ML: detected
              Source: C:\Program Files (x86)\Explower.exeJoe Sandbox ML: detected
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeJoe Sandbox ML: detected
              Source: C:\Program Files (x86)\Explower.exeJoe Sandbox ML: detected
              Source: C:\Program Files (x86)\Explower.exeJoe Sandbox ML: detected
              Source: C:\Users\user\AppData\Local\Temp\server.exeJoe Sandbox ML: detected
              Source: C:\Notepad.exeJoe Sandbox ML: detected
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeJoe Sandbox ML: detected
              Source: C:\Program Files (x86)\Explower.exeJoe Sandbox ML: detected
              Source: L363rVr7oL.exeJoe Sandbox ML: detected
              Source: L363rVr7oL.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: C:\Users\user\Desktop\L363rVr7oL.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
              Source: L363rVr7oL.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

              Spreading

              barindex
              Source: L363rVr7oL.exe, Usb1.cs.Net Code: infect
              Source: server.exe.0.dr, Usb1.cs.Net Code: infect
              Source: Explower.exe.1.dr, Usb1.cs.Net Code: infect
              Source: Explower.exe0.1.dr, Usb1.cs.Net Code: infect
              Source: Explower.exe1.1.dr, Usb1.cs.Net Code: infect
              Source: Explower.exe2.1.dr, Usb1.cs.Net Code: infect
              Source: Notepad.exe.1.dr, Usb1.cs.Net Code: infect
              Source: Explower.exe3.1.dr, Usb1.cs.Net Code: infect
              Source: Microsoft Corporation.exe.1.dr, Usb1.cs.Net Code: infect
              Source: a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exe.1.dr, Usb1.cs.Net Code: infect
              Source: Explower.exe4.1.dr, Usb1.cs.Net Code: infect
              Source: Explower.exe5.1.dr, Usb1.cs.Net Code: infect
              Source: L363rVr7oL.exe, 00000000.00000002.1704428155.00000000036C8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \autorun.inf
              Source: L363rVr7oL.exe, 00000000.00000002.1704428155.00000000036C8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: [autorun]
              Source: L363rVr7oL.exe, 00000000.00000002.1704428155.00000000036C8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: autorun.inf
              Source: L363rVr7oL.exe, 00000000.00000000.1677861095.0000000000082000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: \autorun.inf
              Source: L363rVr7oL.exe, 00000000.00000000.1677861095.0000000000082000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: [autorun]
              Source: L363rVr7oL.exe, 00000000.00000000.1677861095.0000000000082000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: autorun.inf
              Source: L363rVr7oL.exeBinary or memory string: \autorun.inf
              Source: L363rVr7oL.exeBinary or memory string: [autorun]
              Source: L363rVr7oL.exeBinary or memory string: autorun.inf
              Source: Explower.exe4.1.drBinary or memory string: \autorun.inf
              Source: Explower.exe4.1.drBinary or memory string: [autorun]
              Source: Explower.exe4.1.drBinary or memory string: autorun.inf
              Source: Explower.exe2.1.drBinary or memory string: \autorun.inf
              Source: Explower.exe2.1.drBinary or memory string: [autorun]
              Source: Explower.exe2.1.drBinary or memory string: autorun.inf
              Source: Explower.exe1.1.drBinary or memory string: \autorun.inf
              Source: Explower.exe1.1.drBinary or memory string: [autorun]
              Source: Explower.exe1.1.drBinary or memory string: autorun.inf
              Source: Explower.exe6.1.drBinary or memory string: \autorun.inf
              Source: Explower.exe6.1.drBinary or memory string: [autorun]
              Source: Explower.exe6.1.drBinary or memory string: autorun.inf
              Source: Explower.exe.1.drBinary or memory string: \autorun.inf
              Source: Explower.exe.1.drBinary or memory string: [autorun]
              Source: Explower.exe.1.drBinary or memory string: autorun.inf
              Source: Microsoft Corporation.exe.1.drBinary or memory string: \autorun.inf
              Source: Microsoft Corporation.exe.1.drBinary or memory string: [autorun]
              Source: Microsoft Corporation.exe.1.drBinary or memory string: autorun.inf
              Source: Explower.exe3.1.drBinary or memory string: \autorun.inf
              Source: Explower.exe3.1.drBinary or memory string: [autorun]
              Source: Explower.exe3.1.drBinary or memory string: autorun.inf
              Source: Explower.exe5.1.drBinary or memory string: \autorun.inf
              Source: Explower.exe5.1.drBinary or memory string: [autorun]
              Source: Explower.exe5.1.drBinary or memory string: autorun.inf
              Source: server.exe.0.drBinary or memory string: \autorun.inf
              Source: server.exe.0.drBinary or memory string: [autorun]
              Source: server.exe.0.drBinary or memory string: autorun.inf
              Source: Notepad.exe.1.drBinary or memory string: \autorun.inf
              Source: Notepad.exe.1.drBinary or memory string: [autorun]
              Source: Notepad.exe.1.drBinary or memory string: autorun.inf
              Source: a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exe.1.drBinary or memory string: \autorun.inf
              Source: a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exe.1.drBinary or memory string: [autorun]
              Source: a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exe.1.drBinary or memory string: autorun.inf
              Source: Explower.exe0.1.drBinary or memory string: \autorun.inf
              Source: Explower.exe0.1.drBinary or memory string: [autorun]
              Source: Explower.exe0.1.drBinary or memory string: autorun.inf
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Jump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Jump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeFile opened: C:\Users\user\AppData\Jump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeFile opened: C:\Users\user\Jump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:49730 -> 147.185.221.24:37290
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:49730 -> 147.185.221.24:37290
              Source: Network trafficSuricata IDS: 2825564 - Severity 1 - ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act) : 192.168.2.4:49730 -> 147.185.221.24:37290
              Source: global trafficTCP traffic: 147.185.221.24 ports 37290,0,2,3,7,9
              Source: global trafficTCP traffic: 192.168.2.4:49730 -> 147.185.221.24:37290
              Source: Joe Sandbox ViewIP Address: 147.185.221.24 147.185.221.24
              Source: Joe Sandbox ViewASN Name: SALSGIVERUS SALSGIVERUS
              Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
              Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
              Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
              Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
              Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
              Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
              Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
              Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
              Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
              Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
              Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
              Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
              Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
              Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
              Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
              Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
              Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
              Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
              Source: C:\Users\user\Desktop\L363rVr7oL.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: L363rVr7oL.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.L363rVr7oL.exe.80000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.1704428155.00000000036C8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000000.1677861095.0000000000082000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: L363rVr7oL.exe PID: 5480, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: server.exe PID: 3272, type: MEMORYSTR
              Source: Yara matchFile source: C:\Program Files (x86)\Explower.exe, type: DROPPED
              Source: Yara matchFile source: C:\Notepad.exe, type: DROPPED
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exe, type: DROPPED
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, type: DROPPED
              Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\server.exe, type: DROPPED

              System Summary

              barindex
              Source: L363rVr7oL.exe, type: SAMPLEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
              Source: L363rVr7oL.exe, type: SAMPLEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
              Source: L363rVr7oL.exe, type: SAMPLEMatched rule: Detects njRAT based on some strings Author: Sekoia.io
              Source: L363rVr7oL.exe, type: SAMPLEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
              Source: L363rVr7oL.exe, type: SAMPLEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: 0.0.L363rVr7oL.exe.80000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
              Source: 0.0.L363rVr7oL.exe.80000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
              Source: 0.0.L363rVr7oL.exe.80000.0.unpack, type: UNPACKEDPEMatched rule: Detects njRAT based on some strings Author: Sekoia.io
              Source: 0.0.L363rVr7oL.exe.80000.0.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
              Source: 0.0.L363rVr7oL.exe.80000.0.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: 00000000.00000002.1704428155.00000000036C8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
              Source: 00000000.00000002.1704428155.00000000036C8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
              Source: 00000000.00000000.1677861095.0000000000082000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
              Source: 00000000.00000000.1677861095.0000000000082000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects njRAT based on some strings Author: Sekoia.io
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects njRAT based on some strings Author: Sekoia.io
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects njRAT based on some strings Author: Sekoia.io
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects njRAT based on some strings Author: Sekoia.io
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects njRAT based on some strings Author: Sekoia.io
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects njRAT based on some strings Author: Sekoia.io
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
              Source: C:\Users\user\AppData\Local\Temp\server.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exe, type: DROPPEDMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, type: DROPPEDMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
              Source: C:\Users\user\AppData\Local\Temp\server.exe, type: DROPPEDMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exe, type: DROPPEDMatched rule: Detects njRAT based on some strings Author: Sekoia.io
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exe, type: DROPPEDMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
              Source: C:\Users\user\AppData\Local\Temp\server.exe, type: DROPPEDMatched rule: Detects njRAT based on some strings Author: Sekoia.io
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, type: DROPPEDMatched rule: Detects njRAT based on some strings Author: Sekoia.io
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Users\user\AppData\Local\Temp\server.exe, type: DROPPEDMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, type: DROPPEDMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Users\user\AppData\Local\Temp\server.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess Stats: CPU usage > 49%
              Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 1_2_005FBDCA NtQuerySystemInformation,1_2_005FBDCA
              Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 1_2_005FBD99 NtQuerySystemInformation,1_2_005FBD99
              Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Windows\SysWOW64\Explower.exeJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeCode function: 0_2_048642980_2_04864298
              Source: C:\Users\user\Desktop\L363rVr7oL.exeCode function: 0_2_048650000_2_04865000
              Source: C:\Users\user\Desktop\L363rVr7oL.exeCode function: 0_2_0486470F0_2_0486470F
              Source: C:\Users\user\Desktop\L363rVr7oL.exeCode function: 0_2_04864C8F0_2_04864C8F
              Source: C:\Users\user\Desktop\L363rVr7oL.exeCode function: 0_2_04864F9D0_2_04864F9D
              Source: C:\Users\user\Desktop\L363rVr7oL.exeCode function: 0_2_0486499D0_2_0486499D
              Source: C:\Users\user\Desktop\L363rVr7oL.exeCode function: 0_2_04864F2F0_2_04864F2F
              Source: C:\Users\user\Desktop\L363rVr7oL.exeCode function: 0_2_048649360_2_04864936
              Source: C:\Users\user\Desktop\L363rVr7oL.exeCode function: 0_2_048646300_2_04864630
              Source: C:\Users\user\Desktop\L363rVr7oL.exeCode function: 0_2_048645440_2_04864544
              Source: C:\Users\user\Desktop\L363rVr7oL.exeCode function: 0_2_048647D40_2_048647D4
              Source: C:\Users\user\Desktop\L363rVr7oL.exeCode function: 0_2_0486505D0_2_0486505D
              Source: C:\Users\user\Desktop\L363rVr7oL.exeCode function: 0_2_04864B5B0_2_04864B5B
              Source: C:\Users\user\Desktop\L363rVr7oL.exeCode function: 0_2_048654590_2_04865459
              Source: C:\Users\user\Desktop\L363rVr7oL.exeCode function: 0_2_048650E30_2_048650E3
              Source: C:\Users\user\Desktop\L363rVr7oL.exeCode function: 0_2_0486536F0_2_0486536F
              Source: C:\Users\user\Desktop\L363rVr7oL.exeCode function: 0_2_048644F10_2_048644F1
              Source: C:\Users\user\Desktop\L363rVr7oL.exeCode function: 0_2_048649F90_2_048649F9
              Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 1_2_048042901_2_04804290
              Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 1_2_048074C71_2_048074C7
              Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 1_2_048079001_2_04807900
              Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 1_2_048042831_2_04804283
              Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 1_2_04804C871_2_04804C87
              Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 1_2_04804F951_2_04804F95
              Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 1_2_048049951_2_04804995
              Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 1_2_048047CC1_2_048047CC
              Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 1_2_048050DB1_2_048050DB
              Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 1_2_048044E91_2_048044E9
              Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 1_2_048049F11_2_048049F1
              Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 1_2_04804FF81_2_04804FF8
              Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 1_2_048047071_2_04804707
              Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 1_2_04804F271_2_04804F27
              Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 1_2_048046281_2_04804628
              Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 1_2_0480492E1_2_0480492E
              Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 1_2_0480453C1_2_0480453C
              Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 1_2_048054511_2_04805451
              Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 1_2_04804B531_2_04804B53
              Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 1_2_048050551_2_04805055
              Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 1_2_048053671_2_04805367
              Source: L363rVr7oL.exe, 00000000.00000002.1703564136.000000000058E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs L363rVr7oL.exe
              Source: L363rVr7oL.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: L363rVr7oL.exe, type: SAMPLEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
              Source: L363rVr7oL.exe, type: SAMPLEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: L363rVr7oL.exe, type: SAMPLEMatched rule: crimeware_njrat_strings author = Sekoia.io, description = Detects njRAT based on some strings, creation_date = 2022-08-22, classification = TLP:CLEAR, version = 1.0, id = 215807ae-fbcb-478d-8941-e0787b883669
              Source: L363rVr7oL.exe, type: SAMPLEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
              Source: L363rVr7oL.exe, type: SAMPLEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: 0.0.L363rVr7oL.exe.80000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
              Source: 0.0.L363rVr7oL.exe.80000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.0.L363rVr7oL.exe.80000.0.unpack, type: UNPACKEDPEMatched rule: crimeware_njrat_strings author = Sekoia.io, description = Detects njRAT based on some strings, creation_date = 2022-08-22, classification = TLP:CLEAR, version = 1.0, id = 215807ae-fbcb-478d-8941-e0787b883669
              Source: 0.0.L363rVr7oL.exe.80000.0.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
              Source: 0.0.L363rVr7oL.exe.80000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: 00000000.00000002.1704428155.00000000036C8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
              Source: 00000000.00000002.1704428155.00000000036C8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
              Source: 00000000.00000000.1677861095.0000000000082000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
              Source: 00000000.00000000.1677861095.0000000000082000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: crimeware_njrat_strings author = Sekoia.io, description = Detects njRAT based on some strings, creation_date = 2022-08-22, classification = TLP:CLEAR, version = 1.0, id = 215807ae-fbcb-478d-8941-e0787b883669
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: crimeware_njrat_strings author = Sekoia.io, description = Detects njRAT based on some strings, creation_date = 2022-08-22, classification = TLP:CLEAR, version = 1.0, id = 215807ae-fbcb-478d-8941-e0787b883669
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: crimeware_njrat_strings author = Sekoia.io, description = Detects njRAT based on some strings, creation_date = 2022-08-22, classification = TLP:CLEAR, version = 1.0, id = 215807ae-fbcb-478d-8941-e0787b883669
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: crimeware_njrat_strings author = Sekoia.io, description = Detects njRAT based on some strings, creation_date = 2022-08-22, classification = TLP:CLEAR, version = 1.0, id = 215807ae-fbcb-478d-8941-e0787b883669
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: crimeware_njrat_strings author = Sekoia.io, description = Detects njRAT based on some strings, creation_date = 2022-08-22, classification = TLP:CLEAR, version = 1.0, id = 215807ae-fbcb-478d-8941-e0787b883669
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: crimeware_njrat_strings author = Sekoia.io, description = Detects njRAT based on some strings, creation_date = 2022-08-22, classification = TLP:CLEAR, version = 1.0, id = 215807ae-fbcb-478d-8941-e0787b883669
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
              Source: C:\Users\user\AppData\Local\Temp\server.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exe, type: DROPPEDMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, type: DROPPEDMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: C:\Users\user\AppData\Local\Temp\server.exe, type: DROPPEDMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exe, type: DROPPEDMatched rule: crimeware_njrat_strings author = Sekoia.io, description = Detects njRAT based on some strings, creation_date = 2022-08-22, classification = TLP:CLEAR, version = 1.0, id = 215807ae-fbcb-478d-8941-e0787b883669
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exe, type: DROPPEDMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
              Source: C:\Users\user\AppData\Local\Temp\server.exe, type: DROPPEDMatched rule: crimeware_njrat_strings author = Sekoia.io, description = Detects njRAT based on some strings, creation_date = 2022-08-22, classification = TLP:CLEAR, version = 1.0, id = 215807ae-fbcb-478d-8941-e0787b883669
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, type: DROPPEDMatched rule: crimeware_njrat_strings author = Sekoia.io, description = Detects njRAT based on some strings, creation_date = 2022-08-22, classification = TLP:CLEAR, version = 1.0, id = 215807ae-fbcb-478d-8941-e0787b883669
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Users\user\AppData\Local\Temp\server.exe, type: DROPPEDMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, type: DROPPEDMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Users\user\AppData\Local\Temp\server.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: classification engineClassification label: mal100.spre.phis.troj.adwa.evad.winEXE@17/20@0/1
              Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 1_2_005FBC4E AdjustTokenPrivileges,1_2_005FBC4E
              Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 1_2_005FBC17 AdjustTokenPrivileges,1_2_005FBC17
              Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Program Files (x86)\Explower.exeJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeFile created: C:\Users\user\AppData\Roaming\appJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeMutant created: NULL
              Source: C:\Users\user\AppData\Local\Temp\server.exeMutant created: \Sessions\1\BaseNamedObjects\a4d560bc8f8d17c6ed1c6a55f7fdc2b2
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6876:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6164:120:WilError_03
              Source: C:\Users\user\AppData\Local\Temp\server.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
              Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:2892:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5180:120:WilError_03
              Source: C:\Users\user\Desktop\L363rVr7oL.exeFile created: C:\Users\user\AppData\Local\Temp\FransescoPast.txtJump to behavior
              Source: L363rVr7oL.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: L363rVr7oL.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
              Source: C:\Users\user\Desktop\L363rVr7oL.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: L363rVr7oL.exeVirustotal: Detection: 77%
              Source: L363rVr7oL.exeReversingLabs: Detection: 86%
              Source: C:\Users\user\Desktop\L363rVr7oL.exeFile read: C:\Users\user\Desktop\L363rVr7oL.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\L363rVr7oL.exe "C:\Users\user\Desktop\L363rVr7oL.exe"
              Source: C:\Users\user\Desktop\L363rVr7oL.exeProcess created: C:\Users\user\AppData\Local\Temp\server.exe "C:\Users\user\AppData\Local\Temp\server.exe"
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\server.exe" "server.exe" ENABLE
              Source: C:\Windows\SysWOW64\netsh.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall delete allowedprogram "C:\Users\user\AppData\Local\Temp\server.exe"
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\server.exe" "server.exe" ENABLE
              Source: C:\Windows\SysWOW64\netsh.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\netsh.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exe "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exe"
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exe "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exe"
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe"
              Source: C:\Users\user\Desktop\L363rVr7oL.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe"
              Source: C:\Users\user\Desktop\L363rVr7oL.exeProcess created: C:\Users\user\AppData\Local\Temp\server.exe "C:\Users\user\AppData\Local\Temp\server.exe" Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\server.exe" "server.exe" ENABLEJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall delete allowedprogram "C:\Users\user\AppData\Local\Temp\server.exe"Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\server.exe" "server.exe" ENABLEJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeSection loaded: shfolder.dllJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeSection loaded: slc.dllJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: shfolder.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ifmon.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasmontr.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasapi32.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mfc42u.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: authfwcfg.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpolicyiomgr.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: firewallapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcmonitor.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3cfg.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3api.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: onex.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappcfg.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappprxy.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwcfg.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: hnetmon.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netshell.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nlaapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netsetupapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netiohlp.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshhttp.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: httpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshipsec.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: activeds.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: polstore.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winipsec.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: adsldpc.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshwfp.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cabinet.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2pnetsh.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2p.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rpcnsh.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: whhelper.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlancfg.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlanapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wshelper.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wevtapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: peerdistsh.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wcmapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rmclient.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mobilenetworking.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: slc.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ktmw32.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprmsg.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ifmon.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasmontr.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasapi32.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mfc42u.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: authfwcfg.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpolicyiomgr.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: firewallapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcmonitor.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3cfg.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3api.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: onex.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappcfg.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappprxy.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwcfg.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: hnetmon.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netshell.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nlaapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netsetupapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netiohlp.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshhttp.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: httpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshipsec.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: activeds.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: polstore.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winipsec.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: adsldpc.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshwfp.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cabinet.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2pnetsh.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2p.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rpcnsh.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: whhelper.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlancfg.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlanapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wshelper.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wevtapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: peerdistsh.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wcmapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rmclient.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mobilenetworking.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: slc.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ktmw32.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprmsg.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ifmon.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasmontr.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasapi32.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mfc42u.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: authfwcfg.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpolicyiomgr.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: firewallapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcmonitor.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3cfg.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3api.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: onex.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappcfg.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappprxy.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwcfg.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: hnetmon.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netshell.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nlaapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netsetupapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netiohlp.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshhttp.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: httpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshipsec.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: activeds.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: polstore.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winipsec.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: adsldpc.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshwfp.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cabinet.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2pnetsh.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2p.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rpcnsh.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: whhelper.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlancfg.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlanapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wshelper.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wevtapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: peerdistsh.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wcmapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rmclient.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mobilenetworking.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: slc.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ktmw32.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprmsg.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeSection loaded: acgenral.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeSection loaded: samcli.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeSection loaded: msacm32.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeSection loaded: dwmapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeSection loaded: winmmbase.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeSection loaded: winmmbase.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeSection loaded: aclayers.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeSection loaded: shfolder.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeSection loaded: shfolder.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeSection loaded: shfolder.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{674B6698-EE92-11D0-AD71-00C04FD8FDFF}\InprocServer32Jump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dllJump to behavior
              Source: L363rVr7oL.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: C:\Users\user\Desktop\L363rVr7oL.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
              Source: L363rVr7oL.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

              Data Obfuscation

              barindex
              Source: L363rVr7oL.exe, Fransesco.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
              Source: server.exe.0.dr, Fransesco.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
              Source: Explower.exe.1.dr, Fransesco.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
              Source: Explower.exe0.1.dr, Fransesco.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
              Source: Explower.exe1.1.dr, Fransesco.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
              Source: Explower.exe2.1.dr, Fransesco.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
              Source: Notepad.exe.1.dr, Fransesco.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
              Source: Explower.exe3.1.dr, Fransesco.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
              Source: Microsoft Corporation.exe.1.dr, Fransesco.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
              Source: a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exe.1.dr, Fransesco.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
              Source: Explower.exe4.1.dr, Fransesco.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
              Source: Explower.exe5.1.dr, Fransesco.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
              Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\Explower.exeJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Notepad.exeJump to dropped file
              Source: C:\Users\user\Desktop\L363rVr7oL.exeFile created: C:\Users\user\AppData\Local\Temp\server.exeJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Windows\SysWOW64\Explower.exeJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Users\user\AppData\Local\Explower.exeJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Program Files (x86)\Explower.exeJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\History\Explower.exeJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Explower.exeJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Users\user\Favorites\Explower.exeJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Program Files (x86)\Explower.exeJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Windows\SysWOW64\Explower.exeJump to dropped file

              Boot Survival

              barindex
              Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeMemory allocated: 6E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeMemory allocated: 26C0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeMemory allocated: 46C0000 memory commit | memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeMemory allocated: 25E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeMemory allocated: 25E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeMemory allocated: 45E0000 memory commit | memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeMemory allocated: 1510000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeMemory allocated: 34E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeMemory allocated: 1550000 memory commit | memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeMemory allocated: DD0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeMemory allocated: 2CE0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeMemory allocated: 4CE0000 memory commit | memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeMemory allocated: 1680000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeMemory allocated: 3370000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeMemory allocated: 5370000 memory commit | memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeWindow / User API: threadDelayed 1024Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeWindow / User API: threadDelayed 653Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeWindow / User API: threadDelayed 3924Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeWindow / User API: foregroundWindowGot 544Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeWindow / User API: foregroundWindowGot 543Jump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exe TID: 1260Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exe TID: 4940Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exe TID: 4048Thread sleep time: -653000s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exe TID: 4048Thread sleep time: -3924000s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exe TID: 5676Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exe TID: 6828Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe TID: 6828Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe TID: 2488Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Users\user\Desktop\L363rVr7oL.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Jump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Jump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeFile opened: C:\Users\user\AppData\Jump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeFile opened: C:\Users\user\Jump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior
              Source: L363rVr7oL.exe, 00000000.00000002.1703564136.0000000000607000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\y
              Source: L363rVr7oL.exe, 00000000.00000002.1703564136.0000000000607000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
              Source: netsh.exe, 00000004.00000003.1739825795.00000000007B2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll[
              Source: netsh.exe, 00000002.00000003.1721531356.0000000000DA2000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000005.00000003.1742587678.0000000001172000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllS
              Source: server.exe, 00000001.00000002.4140486625.0000000000754000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeMemory allocated: page read and write | page guardJump to behavior
              Source: C:\Users\user\Desktop\L363rVr7oL.exeProcess created: C:\Users\user\AppData\Local\Temp\server.exe "C:\Users\user\AppData\Local\Temp\server.exe" Jump to behavior
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 07:57:13 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 08:34:27 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 05:19:28 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 07:46:55 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 06:38:44 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 09:24:11 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 06:45:13 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 14:16:05 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/07 | 23:14:06 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 07:44:57 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/12 | 12:30:02 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 07:54:16 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 11:55:12 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/07 | 21:48:07 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 04:23:42 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 10:25:38 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 06:44:14 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 02:59:03 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 08:32:36 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 06:03:18 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 07:43:58 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/12 | 12:36:49 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 05:52:39 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 13:45:32 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 05:10:15 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 08:40:51 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 07:32:40 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 11:39:05 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 03:56:49 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 04:14:44 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 11:52:15 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 05:20:57 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/07 | 22:32:44 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 08:39:22 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 06:50:24 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/07 | 21:30:34 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/07 | 23:12:08 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 13:20:12 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 08:57:49 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 04:29:58 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/05 | 18:05:10 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 04:59:20 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 08:07:40 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 10:00:18 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 05:37:40 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 05:42:20 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 12:32:02 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 06:46:43 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/07 | 21:37:18 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 13:30:47 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 06:44:38 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/07 | 22:57:33 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 09:07:52 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/05 | 17:49:13 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 05:44:02 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 04:24:10 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 03:05:18 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 09:51:29 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 12:11:40 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 06:21:16 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/07 | 22:48:19 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 06:53:52 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 07:45:25 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 03:22:31 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 05:48:43 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 10:01:40 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 04:03:39 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 05:51:11 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 08:23:45 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 08:11:12 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 06:38:28 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 05:06:50 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 05:28:42 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 04:48:31 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 08:04:27 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 10:36:27 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 07:26:30 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 07:51:35 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 07:58:05 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 07:26:07 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 04:13:45 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 04:28:30 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 03:51:32 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 04:11:54 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 09:54:26 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 06:10:03 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 07:12:30 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 10:58:11 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/27 | 10:49:44 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 12:08:20 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 12:39:03 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 03:38:37 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 14:10:34 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 01:21:33 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 10:22:50 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 09:18:25 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 03:54:06 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 08:49:26 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 08:28:48 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 09:26:54 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 07:15:41 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 08:47:35 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 08:26:11 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 09:12:23 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 09:55:56 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 08:08:54 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 11:50:48 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/07 | 23:23:28 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 10:05:44 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 05:42:49 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 06:44:59 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 00:25:39 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 06:24:27 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/05 | 17:45:48 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/05 | 18:09:51 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 04:58:28 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/29 | 18:41:49 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 13:38:16 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 08:19:05 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 10:18:45 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 08:18:13 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 10:30:25 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 07:38:56 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 08:42:19 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/12 | 12:31:09 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/07 | 21:57:52 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 11:00:53 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 08:17:14 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 03:00:32 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 03:19:35 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 09:25:55 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 06:16:29 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 07:16:40 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 08:46:53 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 05:09:07 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 09:35:14 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 03:55:57 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 09:34:32 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 06:24:20 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 06:31:27 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 04:39:02 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 07:25:38 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 07:08:25 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 12:37:42 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 04:59:03 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 05:26:58 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 00:23:50 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 04:20:24 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 04:56:06 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 06:44:28 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 07:49:31 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 08:14:48 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 13:04:19 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 05:14:01 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 08:23:30 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 07:36:28 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 09:43:23 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 04:24:24 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 09:41:00 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 03:49:19 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 04:13:59 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 06:22:05 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 07:04:46 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 05:02:44 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 05:18:22 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 07:31:04 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 04:27:39 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 10:04:28 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 04:55:10 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 08:41:13 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/07 | 23:01:36 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 04:58:51 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 05:11:29 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 05:31:32 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 03:57:34 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/07 | 22:41:18 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/29 | 17:34:50 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 00:51:05 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/07 | 21:44:28 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 06:04:50 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 07:52:10 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 05:47:58 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 07:13:37 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 06:28:30 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 13:18:05 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 13:57:48 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 09:42:55 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 04:17:24 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 14:20:38 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 04:34:10 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/07 | 22:54:22 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 08:24:54 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 05:12:30 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/07 | 22:40:22 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 08:52:47 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 14:24:59 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 05:05:18 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 06:55:40 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/07 | 22:07:46 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 07:55:29 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 08:15:15 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 04:39:54 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 04:32:01 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 07:25:45 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 04:57:29 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/27 | 13:29:18 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 04:37:04 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 07:22:13 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/12 | 12:26:28 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 03:02:34 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 05:10:21 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/12 | 12:34:57 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 04:40:08 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 13:43:40 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 04:24:18 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/07 | 22:13:12 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 14:19:50 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 05:44:26 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 00:24:26 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 07:44:09 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 04:24:04 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/07 | 22:33:37 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 06:22:32 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 05:48:26 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 00:22:28 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 05:32:08 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 13:17:37 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 13:20:43 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/12 | 12:34:43 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 06:47:19 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 14:23:04 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 12:12:53 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 07:47:02 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 06:37:00 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 05:22:17 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 08:23:24 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 05:21:08 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 03:08:32 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 09:36:38 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 10:21:59 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 09:31:35 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 05:31:14 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 03:55:56 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 07:31:18 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 04:23:36 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 05:11:15 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 09:32:03 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 04:23:56 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 10:15:48 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 12:43:05 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 06:33:19 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 12:33:46 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 06:21:23 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 14:18:28 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 03:34:09 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 05:43:50 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 08:22:56 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 07:58:36 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 04:37:56 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 10:47:22 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 07:19:55 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 07:47:48 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 11:39:42 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 11:39:22 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 07:13:43 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 06:50:45 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 04:10:18 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 03:15:32 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 12:09:27 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 04:26:09 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 10:25:07 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 04:28:59 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 04:08:34 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 08:59:06 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 03:18:25 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 08:32:35 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 08:14:40 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 08:30:24 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 09:10:31 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 04:43:32 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 07:14:41 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 12:33:57 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 05:54:05 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 08:22:45 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 12:34:28 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 04:33:45 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 11:32:15 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 03:08:47 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 09:26:34 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 09:46:59 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 06:59:50 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 08:17:31 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 07:32:49 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 06:49:34 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 09:35:51 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 05:44:27 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/07 | 22:44:26 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 07:44:53 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 05:09:25 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 04:13:51 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 08:47:34 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 14:03:24 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/07 | 23:04:50 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 10:24:42 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 09:40:43 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 06:44:39 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 08:43:45 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 06:14:27 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/12 | 12:30:53 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 05:33:38 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/05 | 17:49:33 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 04:03:04 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 06:49:58 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 08:32:01 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 10:31:04 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 07:01:28 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 03:12:28 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 08:22:21 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 04:49:55 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 00:23:13 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 11:05:05 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 04:09:32 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/27 | 10:28:17 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 06:37:51 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 07:31:45 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 13:10:47 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 08:59:22 - Program Manager
              Source: L363rVr7oL.exe, Explower.exe4.1.dr, Explower.exe2.1.dr, Explower.exe1.1.dr, Explower.exe6.1.dr, Explower.exe.1.dr, Microsoft Corporation.exe.1.dr, Explower.exe3.1.dr, Explower.exe5.1.dr, server.exe.0.dr, Notepad.exe.1.dr, a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exe.1.drBinary or memory string: Shell_traywnd+MostrarBarraDeTarefas
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 08:18:30 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 07:45:52 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 06:09:06 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 06:03:45 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 12:50:01 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/12 | 12:28:32 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 05:57:59 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 09:41:11 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 10:50:22 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 12:14:34 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 07:56:27 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 07:38:39 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 03:19:29 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/07 | 23:16:10 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 10:44:31 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 08:03:31 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 08:57:55 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 08:31:17 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/07 | 22:58:43 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 06:47:24 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 10:33:47 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/07 | 23:13:55 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 10:55:39 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 12:52:38 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 06:02:46 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 03:27:47 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 05:01:25 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/07 | 22:56:59 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 04:42:17 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/07 | 23:07:24 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 09:20:35 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 05:03:12 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 00:23:16 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 05:10:02 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 06:48:40 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 00:22:14 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 03:57:07 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 05:42:17 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 13:32:25 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/07 | 21:40:13 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 07:19:27 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 05:02:03 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 04:45:33 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 06:27:19 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 05:26:45 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 04:59:40 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 00:27:26 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 06:59:48 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/29 | 18:43:50 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 04:50:56 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 05:42:00 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 08:06:04 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 03:10:25 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 07:28:04 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 00:25:56 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/12 | 12:24:22 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 05:18:47 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 08:36:08 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 07:42:10 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 10:22:16 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 03:48:47 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 04:09:58 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 07:42:03 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 08:56:39 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 08:47:18 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 03:32:00 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 07:24:52 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 06:26:08 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 08:48:00 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/05 | 18:03:37 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 04:34:39 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 09:56:44 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 02:04:34 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 11:43:35 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/07 | 21:58:17 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 06:28:41 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 06:14:41 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 13:59:46 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 06:40:48 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 06:31:07 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 06:03:54 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 14:16:56 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 00:26:41 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 05:23:43 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 06:08:33 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 01:48:03 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 08:51:16 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 07:24:46 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 03:41:05 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 09:36:07 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 00:22:51 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/07 | 23:08:01 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 04:11:43 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 07:06:40 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 05:31:29 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 07:07:36 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 09:00:51 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 08:20:40 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 09:07:47 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 02:32:34 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 07:44:46 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 05:48:56 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 05:47:54 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 04:00:24 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 07:44:39 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 06:55:58 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 07:43:44 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 06:53:09 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 08:28:50 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 08:47:01 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 08:23:55 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 10:08:24 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 07:28:35 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 14:11:30 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 14:23:09 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 12:38:07 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 07:04:21 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 05:39:11 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 05:14:32 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 04:06:21 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 06:13:19 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 09:20:04 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 10:03:01 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 06:48:17 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/27 | 09:38:35 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 05:16:43 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 10:04:51 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 04:38:28 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 00:23:53 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 05:30:02 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 07:14:36 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 11:26:15 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/07 | 22:39:45 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 07:16:06 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 08:43:11 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 04:04:43 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 04:59:34 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 07:37:53 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 08:16:15 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 06:30:51 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 05:26:07 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 09:10:19 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 03:50:48 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 05:10:36 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/05 | 18:00:32 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 05:24:36 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 05:09:42 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 06:58:11 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 05:14:19 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 03:18:36 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 05:44:01 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 04:55:13 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 03:13:13 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 05:54:47 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 07:09:38 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 05:42:59 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 05:23:36 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 06:50:41 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 03:07:06 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 10:15:17 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 11:55:57 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/07 | 22:09:33 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 08:08:12 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 06:13:25 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/07 | 23:14:26 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 05:05:07 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 09:24:31 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 07:45:08 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 05:05:54 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 04:16:32 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/10 | 06:13:58 - Program Manager
              Source: server.exe, 00000001.00000002.4141604873.00000000038F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/03 | 11:56:31 - Program Manager
              Source: C:\Windows\SysWOW64\netsh.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Lowering of HIPS / PFW / Operating System Security Settings

              barindex
              Source: L363rVr7oL.exe, Fransesco.cs.Net Code: INS
              Source: server.exe.0.dr, Fransesco.cs.Net Code: INS
              Source: Explower.exe.1.dr, Fransesco.cs.Net Code: INS
              Source: Explower.exe0.1.dr, Fransesco.cs.Net Code: INS
              Source: Explower.exe1.1.dr, Fransesco.cs.Net Code: INS
              Source: Explower.exe2.1.dr, Fransesco.cs.Net Code: INS
              Source: Notepad.exe.1.dr, Fransesco.cs.Net Code: INS
              Source: Explower.exe3.1.dr, Fransesco.cs.Net Code: INS
              Source: Microsoft Corporation.exe.1.dr, Fransesco.cs.Net Code: INS
              Source: a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exe.1.dr, Fransesco.cs.Net Code: INS
              Source: Explower.exe4.1.dr, Fransesco.cs.Net Code: INS
              Source: Explower.exe5.1.dr, Fransesco.cs.Net Code: INS
              Source: C:\Users\user\AppData\Local\Temp\server.exeRegistry value created: HKEY_CURRENT_USER\Environment SEE_MASK_NOZONECHECKSJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\server.exe" "server.exe" ENABLE
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\server.exe" "server.exe" ENABLE
              Source: C:\Users\user\Desktop\L363rVr7oL.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct
              Source: C:\Users\user\Desktop\L363rVr7oL.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: L363rVr7oL.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.L363rVr7oL.exe.80000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.1704428155.00000000036C8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000000.1677861095.0000000000082000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: L363rVr7oL.exe PID: 5480, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: server.exe PID: 3272, type: MEMORYSTR
              Source: Yara matchFile source: C:\Program Files (x86)\Explower.exe, type: DROPPED
              Source: Yara matchFile source: C:\Notepad.exe, type: DROPPED
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exe, type: DROPPED
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, type: DROPPED
              Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\server.exe, type: DROPPED

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: L363rVr7oL.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.L363rVr7oL.exe.80000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.1704428155.00000000036C8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000000.1677861095.0000000000082000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: L363rVr7oL.exe PID: 5480, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: server.exe PID: 3272, type: MEMORYSTR
              Source: Yara matchFile source: C:\Program Files (x86)\Explower.exe, type: DROPPED
              Source: Yara matchFile source: C:\Notepad.exe, type: DROPPED
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exe, type: DROPPED
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, type: DROPPED
              Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\server.exe, type: DROPPED
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire Infrastructure11
              Replication Through Removable Media
              1
              Windows Management Instrumentation
              12
              Registry Run Keys / Startup Folder
              1
              Access Token Manipulation
              32
              Masquerading
              OS Credential Dumping111
              Security Software Discovery
              Remote Services1
              Archive Collected Data
              1
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/Job1
              DLL Side-Loading
              12
              Process Injection
              41
              Disable or Modify Tools
              LSASS Memory2
              Process Discovery
              Remote Desktop Protocol1
              Clipboard Data
              1
              Non-Standard Port
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)12
              Registry Run Keys / Startup Folder
              31
              Virtualization/Sandbox Evasion
              Security Account Manager31
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
              DLL Side-Loading
              1
              Access Token Manipulation
              NTDS1
              Application Window Discovery
              Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script12
              Process Injection
              LSA Secrets1
              Peripheral Device Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              Software Packing
              Cached Domain Credentials2
              File and Directory Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
              DLL Side-Loading
              DCSync12
              System Information Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 signatures2 2 Behavior Graph ID: 1580557 Sample: L363rVr7oL.exe Startdate: 25/12/2024 Architecture: WINDOWS Score: 100 50 Suricata IDS alerts for network traffic 2->50 52 Found malware configuration 2->52 54 Malicious sample detected (through community Yara rule) 2->54 56 12 other signatures 2->56 8 L363rVr7oL.exe 7 2->8         started        11 Explower.exe 3 2->11         started        13 Microsoft Corporation.exe 3 2->13         started        15 2 other processes 2->15 process3 file4 44 C:\Users\user\AppData\Local\Temp\server.exe, PE32 8->44 dropped 46 C:\Users\user\AppData\...\L363rVr7oL.exe.log, ASCII 8->46 dropped 17 server.exe 1 15 8->17         started        22 conhost.exe 8->22         started        process5 dnsIp6 48 147.185.221.24, 37290, 49730 SALSGIVERUS United States 17->48 36 C:\Windows\SysWOW64xplower.exe, PE32 17->36 dropped 38 C:\Users\user\Favoritesxplower.exe, PE32 17->38 dropped 40 a4d560bc8f8d17c6ed...2Windows Update.exe, PE32 17->40 dropped 42 8 other malicious files 17->42 dropped 58 Antivirus detection for dropped file 17->58 60 Multi AV Scanner detection for dropped file 17->60 62 Machine Learning detection for dropped file 17->62 64 4 other signatures 17->64 24 netsh.exe 2 17->24         started        26 netsh.exe 2 17->26         started        28 netsh.exe 2 17->28         started        file7 signatures8 process9 process10 30 conhost.exe 24->30         started        32 conhost.exe 26->32         started        34 conhost.exe 28->34         started       

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              L363rVr7oL.exe77%VirustotalBrowse
              L363rVr7oL.exe87%ReversingLabsByteCode-MSIL.Backdoor.njRAT
              L363rVr7oL.exe100%AviraTR/Dropper.Gen
              L363rVr7oL.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Program Files (x86)\Explower.exe100%AviraTR/Dropper.Gen
              C:\Program Files (x86)\Explower.exe100%AviraTR/Dropper.Gen
              C:\Program Files (x86)\Explower.exe100%AviraTR/Dropper.Gen
              C:\Program Files (x86)\Explower.exe100%AviraTR/Dropper.Gen
              C:\Program Files (x86)\Explower.exe100%AviraTR/Dropper.Gen
              C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe100%AviraTR/Dropper.Gen
              C:\Program Files (x86)\Explower.exe100%AviraTR/Dropper.Gen
              C:\Program Files (x86)\Explower.exe100%AviraTR/Dropper.Gen
              C:\Users\user\AppData\Local\Temp\server.exe100%AviraTR/Dropper.Gen
              C:\Notepad.exe100%AviraTR/Dropper.Gen
              C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exe100%AviraTR/Dropper.Gen
              C:\Program Files (x86)\Explower.exe100%AviraTR/Dropper.Gen
              C:\Program Files (x86)\Explower.exe100%Joe Sandbox ML
              C:\Program Files (x86)\Explower.exe100%Joe Sandbox ML
              C:\Program Files (x86)\Explower.exe100%Joe Sandbox ML
              C:\Program Files (x86)\Explower.exe100%Joe Sandbox ML
              C:\Program Files (x86)\Explower.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe100%Joe Sandbox ML
              C:\Program Files (x86)\Explower.exe100%Joe Sandbox ML
              C:\Program Files (x86)\Explower.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Local\Temp\server.exe100%Joe Sandbox ML
              C:\Notepad.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exe100%Joe Sandbox ML
              C:\Program Files (x86)\Explower.exe100%Joe Sandbox ML
              C:\Notepad.exe87%ReversingLabsByteCode-MSIL.Backdoor.njRAT
              C:\Notepad.exe77%VirustotalBrowse
              C:\Program Files (x86)\Explower.exe87%ReversingLabsByteCode-MSIL.Backdoor.njRAT
              C:\Program Files (x86)\Explower.exe77%VirustotalBrowse
              C:\Users\user\AppData\Local\Explower.exe87%ReversingLabsByteCode-MSIL.Backdoor.njRAT
              C:\Users\user\AppData\Local\Explower.exe77%VirustotalBrowse
              C:\Users\user\AppData\Local\Microsoft\Windows\History\Explower.exe87%ReversingLabsByteCode-MSIL.Backdoor.njRAT
              C:\Users\user\AppData\Local\Microsoft\Windows\History\Explower.exe77%VirustotalBrowse
              C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Explower.exe87%ReversingLabsByteCode-MSIL.Backdoor.njRAT
              C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\Explower.exe87%ReversingLabsByteCode-MSIL.Backdoor.njRAT
              C:\Users\user\AppData\Local\Temp\server.exe87%ReversingLabsByteCode-MSIL.Backdoor.njRAT
              C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe87%ReversingLabsByteCode-MSIL.Backdoor.njRAT
              C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe87%ReversingLabsByteCode-MSIL.Backdoor.njRAT
              C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exe87%ReversingLabsByteCode-MSIL.Backdoor.njRAT
              C:\Users\user\Favorites\Explower.exe87%ReversingLabsByteCode-MSIL.Backdoor.njRAT
              C:\Windows\SysWOW64\Explower.exe87%ReversingLabsByteCode-MSIL.Backdoor.njRAT
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              No contacted domains info
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              147.185.221.24
              unknownUnited States
              12087SALSGIVERUStrue
              Joe Sandbox version:41.0.0 Charoite
              Analysis ID:1580557
              Start date and time:2024-12-25 06:21:04 +01:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 8m 28s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:17
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:1
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:L363rVr7oL.exe
              renamed because original name is a hash value
              Original Sample Name:2162d29eb849e9c799f3a951e52c9d4d.exe
              Detection:MAL
              Classification:mal100.spre.phis.troj.adwa.evad.winEXE@17/20@0/1
              EGA Information:
              • Successful, ratio: 100%
              HCA Information:
              • Successful, ratio: 96%
              • Number of executed functions: 113
              • Number of non-executed functions: 18
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Override analysis time to 240000 for current running targets taking high CPU consumption
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, consent.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
              • Excluded IPs from analysis (whitelisted): 52.149.20.212, 13.107.246.63
              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
              • Not all processes where analyzed, report is missing behavior information
              • Report size exceeded maximum capacity and may have missing behavior information.
              • Report size exceeded maximum capacity and may have missing disassembly code.
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              TimeTypeDescription
              00:22:34API Interceptor253651x Sleep call for process: server.exe modified
              05:22:01AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exe
              05:22:10AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe
              05:22:18AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              147.185.221.24horrify's Modx Menu v1.exeGet hashmaliciousXWormBrowse
                fvbhdyuJYi.exeGet hashmaliciousXWormBrowse
                  8DiSW8IPEF.exeGet hashmaliciousXWormBrowse
                    KJhsNv2RcI.exeGet hashmaliciousXWormBrowse
                      PjGz899RZV.exeGet hashmaliciousXWormBrowse
                        ehxF3rusxJ.exeGet hashmaliciousXWormBrowse
                          Client-built-Playit.exeGet hashmaliciousQuasarBrowse
                            file.exeGet hashmaliciousScreenConnect Tool, Amadey, RHADAMANTHYS, XWorm, XmrigBrowse
                              72OWK7wBVH.exeGet hashmaliciousXWormBrowse
                                aZDwfEKorn.exeGet hashmaliciousXWormBrowse
                                  No context
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  SALSGIVERUSWO.exeGet hashmaliciousMetasploitBrowse
                                  • 147.185.221.23
                                  reddit.exeGet hashmaliciousMetasploitBrowse
                                  • 147.185.221.23
                                  loligang.mpsl.elfGet hashmaliciousMiraiBrowse
                                  • 147.176.119.110
                                  horrify's Modx Menu v1.exeGet hashmaliciousXWormBrowse
                                  • 147.185.221.24
                                  fvbhdyuJYi.exeGet hashmaliciousXWormBrowse
                                  • 147.185.221.24
                                  8DiSW8IPEF.exeGet hashmaliciousXWormBrowse
                                  • 147.185.221.24
                                  twE44mm07j.exeGet hashmaliciousXWormBrowse
                                  • 147.185.221.18
                                  YgJ5inWPQO.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                  • 147.185.221.18
                                  dr2YKJiGH9.exeGet hashmaliciousXWormBrowse
                                  • 147.185.221.23
                                  KJhsNv2RcI.exeGet hashmaliciousXWormBrowse
                                  • 147.185.221.24
                                  No context
                                  No context
                                  Process:C:\Users\user\AppData\Local\Temp\server.exe
                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):95232
                                  Entropy (8bit):5.566087372113848
                                  Encrypted:false
                                  SSDEEP:1536:oGlTr1IDavlZhbSc39YdjEwzGi1dDhDrgS:oGlSDavlZI8mqi1dtk
                                  MD5:2162D29EB849E9C799F3A951E52C9D4D
                                  SHA1:386CB6A7CF616DBCE0823F6FF23C1CBCB1D302E5
                                  SHA-256:150046FC66A80E4668FC08417E422C5F97489831823C898B50CA4ED6BC5A6F12
                                  SHA-512:64CE9074FE48C0A7BD640FF9F00F56DA340F0CC2D13E34C3AA5BCCF00F675287B02E7AAA73252669FF9591D646B9C400E0AF11EFE710CCCECA4AEED59D7A323A
                                  Malicious:true
                                  Yara Hits:
                                  • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Notepad.exe, Author: Joe Security
                                  • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Notepad.exe, Author: Joe Security
                                  • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Notepad.exe, Author: Joe Security
                                  • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Notepad.exe, Author: Joe Security
                                  • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Notepad.exe, Author: Joe Security
                                  • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\Notepad.exe, Author: unknown
                                  • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: C:\Notepad.exe, Author: Florian Roth
                                  • Rule: crimeware_njrat_strings, Description: Detects njRAT based on some strings, Source: C:\Notepad.exe, Author: Sekoia.io
                                  • Rule: Njrat, Description: detect njRAT in memory, Source: C:\Notepad.exe, Author: JPCERT/CC Incident Response Group
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Notepad.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Notepad.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Notepad.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Notepad.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Notepad.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Notepad.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Notepad.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Notepad.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Notepad.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Notepad.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Notepad.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Notepad.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Notepad.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Notepad.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Notepad.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Notepad.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Notepad.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Notepad.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Notepad.exe, Author: ditekSHen
                                  Antivirus:
                                  • Antivirus: Avira, Detection: 100%
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: ReversingLabs, Detection: 87%
                                  • Antivirus: Virustotal, Detection: 77%, Browse
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...?.dg.................p............... ........@.. ....................................@....................................S.................................................................................... ............... ..H............text...4o... ...p.................. ..`.reloc...............r..............@..B................................................................H.......................................................................&.(......**..(......*.s.........s ........s!........s".........*.0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                                  Process:C:\Users\user\AppData\Local\Temp\server.exe
                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):95232
                                  Entropy (8bit):5.566087372113848
                                  Encrypted:false
                                  SSDEEP:1536:oGlTr1IDavlZhbSc39YdjEwzGi1dDhDrgS:oGlSDavlZI8mqi1dtk
                                  MD5:2162D29EB849E9C799F3A951E52C9D4D
                                  SHA1:386CB6A7CF616DBCE0823F6FF23C1CBCB1D302E5
                                  SHA-256:150046FC66A80E4668FC08417E422C5F97489831823C898B50CA4ED6BC5A6F12
                                  SHA-512:64CE9074FE48C0A7BD640FF9F00F56DA340F0CC2D13E34C3AA5BCCF00F675287B02E7AAA73252669FF9591D646B9C400E0AF11EFE710CCCECA4AEED59D7A323A
                                  Malicious:true
                                  Yara Hits:
                                  • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Program Files (x86)\Explower.exe, Author: Joe Security
                                  • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Program Files (x86)\Explower.exe, Author: Joe Security
                                  • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\Program Files (x86)\Explower.exe, Author: unknown
                                  • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: C:\Program Files (x86)\Explower.exe, Author: Florian Roth
                                  • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: C:\Program Files (x86)\Explower.exe, Author: Florian Roth
                                  • Rule: crimeware_njrat_strings, Description: Detects njRAT based on some strings, Source: C:\Program Files (x86)\Explower.exe, Author: Sekoia.io
                                  • Rule: crimeware_njrat_strings, Description: Detects njRAT based on some strings, Source: C:\Program Files (x86)\Explower.exe, Author: Sekoia.io
                                  • Rule: crimeware_njrat_strings, Description: Detects njRAT based on some strings, Source: C:\Program Files (x86)\Explower.exe, Author: Sekoia.io
                                  • Rule: crimeware_njrat_strings, Description: Detects njRAT based on some strings, Source: C:\Program Files (x86)\Explower.exe, Author: Sekoia.io
                                  • Rule: crimeware_njrat_strings, Description: Detects njRAT based on some strings, Source: C:\Program Files (x86)\Explower.exe, Author: Sekoia.io
                                  • Rule: Njrat, Description: detect njRAT in memory, Source: C:\Program Files (x86)\Explower.exe, Author: JPCERT/CC Incident Response Group
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
                                  Antivirus:
                                  • Antivirus: Avira, Detection: 100%
                                  • Antivirus: Avira, Detection: 100%
                                  • Antivirus: Avira, Detection: 100%
                                  • Antivirus: Avira, Detection: 100%
                                  • Antivirus: Avira, Detection: 100%
                                  • Antivirus: Avira, Detection: 100%
                                  • Antivirus: Avira, Detection: 100%
                                  • Antivirus: Avira, Detection: 100%
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: ReversingLabs, Detection: 87%
                                  • Antivirus: Virustotal, Detection: 77%, Browse
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...?.dg.................p............... ........@.. ....................................@....................................S.................................................................................... ............... ..H............text...4o... ...p.................. ..`.reloc...............r..............@..B................................................................H.......................................................................&.(......**..(......*.s.........s ........s!........s".........*.0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                                  Process:C:\Users\user\AppData\Local\Temp\server.exe
                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):95232
                                  Entropy (8bit):5.566087372113848
                                  Encrypted:false
                                  SSDEEP:1536:oGlTr1IDavlZhbSc39YdjEwzGi1dDhDrgS:oGlSDavlZI8mqi1dtk
                                  MD5:2162D29EB849E9C799F3A951E52C9D4D
                                  SHA1:386CB6A7CF616DBCE0823F6FF23C1CBCB1D302E5
                                  SHA-256:150046FC66A80E4668FC08417E422C5F97489831823C898B50CA4ED6BC5A6F12
                                  SHA-512:64CE9074FE48C0A7BD640FF9F00F56DA340F0CC2D13E34C3AA5BCCF00F675287B02E7AAA73252669FF9591D646B9C400E0AF11EFE710CCCECA4AEED59D7A323A
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 87%
                                  • Antivirus: Virustotal, Detection: 77%, Browse
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...?.dg.................p............... ........@.. ....................................@....................................S.................................................................................... ............... ..H............text...4o... ...p.................. ..`.reloc...............r..............@..B................................................................H.......................................................................&.(......**..(......*.s.........s ........s!........s".........*.0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                                  Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):525
                                  Entropy (8bit):5.259753436570609
                                  Encrypted:false
                                  SSDEEP:12:Q3LaJU2C9XAn10Ug+9pfu9t0U29xtUz1B0U2uk71K6xhk7v:MLF2CpI3zffup29Iz52Ve
                                  MD5:260E01CC001F9C4643CA7A62F395D747
                                  SHA1:492AD0ACE3A9C8736909866EEA168962D418BE5A
                                  SHA-256:4BC52CCF866F489772A6919A0CC2C55B1432729D6BDF29E17E5853ABDFAB6030
                                  SHA-512:01AF7D75257E3DBD460E328F5C057D0367B83D3D9397E89CA3AE54AB9B2842D62352D8CCB4BE98ACE0C5667846759D32C199DE39ECCD0CF9CD6A83267D27E7C4
                                  Malicious:false
                                  Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\bec14584c93014efbc76285c35d1e891\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\7d443c6c007fe8696f9aa6ff1da53ef7\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\2cdaeaf53e3d49038cf7cb0ce9d805d3\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\d0e5535854cce87ea7f2d69d0594b7a8\System.Windows.Forms.ni.dll",0..
                                  Process:C:\Users\user\Desktop\L363rVr7oL.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):525
                                  Entropy (8bit):5.259753436570609
                                  Encrypted:false
                                  SSDEEP:12:Q3LaJU2C9XAn10Ug+9pfu9t0U29xtUz1B0U2uk71K6xhk7v:MLF2CpI3zffup29Iz52Ve
                                  MD5:260E01CC001F9C4643CA7A62F395D747
                                  SHA1:492AD0ACE3A9C8736909866EEA168962D418BE5A
                                  SHA-256:4BC52CCF866F489772A6919A0CC2C55B1432729D6BDF29E17E5853ABDFAB6030
                                  SHA-512:01AF7D75257E3DBD460E328F5C057D0367B83D3D9397E89CA3AE54AB9B2842D62352D8CCB4BE98ACE0C5667846759D32C199DE39ECCD0CF9CD6A83267D27E7C4
                                  Malicious:true
                                  Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\bec14584c93014efbc76285c35d1e891\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\7d443c6c007fe8696f9aa6ff1da53ef7\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\2cdaeaf53e3d49038cf7cb0ce9d805d3\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\d0e5535854cce87ea7f2d69d0594b7a8\System.Windows.Forms.ni.dll",0..
                                  Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):525
                                  Entropy (8bit):5.259753436570609
                                  Encrypted:false
                                  SSDEEP:12:Q3LaJU2C9XAn10Ug+9pfu9t0U29xtUz1B0U2uk71K6xhk7v:MLF2CpI3zffup29Iz52Ve
                                  MD5:260E01CC001F9C4643CA7A62F395D747
                                  SHA1:492AD0ACE3A9C8736909866EEA168962D418BE5A
                                  SHA-256:4BC52CCF866F489772A6919A0CC2C55B1432729D6BDF29E17E5853ABDFAB6030
                                  SHA-512:01AF7D75257E3DBD460E328F5C057D0367B83D3D9397E89CA3AE54AB9B2842D62352D8CCB4BE98ACE0C5667846759D32C199DE39ECCD0CF9CD6A83267D27E7C4
                                  Malicious:false
                                  Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\bec14584c93014efbc76285c35d1e891\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\7d443c6c007fe8696f9aa6ff1da53ef7\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\2cdaeaf53e3d49038cf7cb0ce9d805d3\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\d0e5535854cce87ea7f2d69d0594b7a8\System.Windows.Forms.ni.dll",0..
                                  Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):525
                                  Entropy (8bit):5.259753436570609
                                  Encrypted:false
                                  SSDEEP:12:Q3LaJU2C9XAn10Ug+9pfu9t0U29xtUz1B0U2uk71K6xhk7v:MLF2CpI3zffup29Iz52Ve
                                  MD5:260E01CC001F9C4643CA7A62F395D747
                                  SHA1:492AD0ACE3A9C8736909866EEA168962D418BE5A
                                  SHA-256:4BC52CCF866F489772A6919A0CC2C55B1432729D6BDF29E17E5853ABDFAB6030
                                  SHA-512:01AF7D75257E3DBD460E328F5C057D0367B83D3D9397E89CA3AE54AB9B2842D62352D8CCB4BE98ACE0C5667846759D32C199DE39ECCD0CF9CD6A83267D27E7C4
                                  Malicious:false
                                  Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\bec14584c93014efbc76285c35d1e891\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\7d443c6c007fe8696f9aa6ff1da53ef7\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\2cdaeaf53e3d49038cf7cb0ce9d805d3\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\d0e5535854cce87ea7f2d69d0594b7a8\System.Windows.Forms.ni.dll",0..
                                  Process:C:\Users\user\AppData\Local\Temp\server.exe
                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):95232
                                  Entropy (8bit):5.566087372113848
                                  Encrypted:false
                                  SSDEEP:1536:oGlTr1IDavlZhbSc39YdjEwzGi1dDhDrgS:oGlSDavlZI8mqi1dtk
                                  MD5:2162D29EB849E9C799F3A951E52C9D4D
                                  SHA1:386CB6A7CF616DBCE0823F6FF23C1CBCB1D302E5
                                  SHA-256:150046FC66A80E4668FC08417E422C5F97489831823C898B50CA4ED6BC5A6F12
                                  SHA-512:64CE9074FE48C0A7BD640FF9F00F56DA340F0CC2D13E34C3AA5BCCF00F675287B02E7AAA73252669FF9591D646B9C400E0AF11EFE710CCCECA4AEED59D7A323A
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 87%
                                  • Antivirus: Virustotal, Detection: 77%, Browse
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...?.dg.................p............... ........@.. ....................................@....................................S.................................................................................... ............... ..H............text...4o... ...p.................. ..`.reloc...............r..............@..B................................................................H.......................................................................&.(......**..(......*.s.........s ........s!........s".........*.0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                                  Process:C:\Users\user\AppData\Local\Temp\server.exe
                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):95232
                                  Entropy (8bit):5.566087372113848
                                  Encrypted:false
                                  SSDEEP:1536:oGlTr1IDavlZhbSc39YdjEwzGi1dDhDrgS:oGlSDavlZI8mqi1dtk
                                  MD5:2162D29EB849E9C799F3A951E52C9D4D
                                  SHA1:386CB6A7CF616DBCE0823F6FF23C1CBCB1D302E5
                                  SHA-256:150046FC66A80E4668FC08417E422C5F97489831823C898B50CA4ED6BC5A6F12
                                  SHA-512:64CE9074FE48C0A7BD640FF9F00F56DA340F0CC2D13E34C3AA5BCCF00F675287B02E7AAA73252669FF9591D646B9C400E0AF11EFE710CCCECA4AEED59D7A323A
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 87%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...?.dg.................p............... ........@.. ....................................@....................................S.................................................................................... ............... ..H............text...4o... ...p.................. ..`.reloc...............r..............@..B................................................................H.......................................................................&.(......**..(......*.s.........s ........s!........s".........*.0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                                  Process:C:\Users\user\AppData\Local\Temp\server.exe
                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):95232
                                  Entropy (8bit):5.566087372113848
                                  Encrypted:false
                                  SSDEEP:1536:oGlTr1IDavlZhbSc39YdjEwzGi1dDhDrgS:oGlSDavlZI8mqi1dtk
                                  MD5:2162D29EB849E9C799F3A951E52C9D4D
                                  SHA1:386CB6A7CF616DBCE0823F6FF23C1CBCB1D302E5
                                  SHA-256:150046FC66A80E4668FC08417E422C5F97489831823C898B50CA4ED6BC5A6F12
                                  SHA-512:64CE9074FE48C0A7BD640FF9F00F56DA340F0CC2D13E34C3AA5BCCF00F675287B02E7AAA73252669FF9591D646B9C400E0AF11EFE710CCCECA4AEED59D7A323A
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 87%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...?.dg.................p............... ........@.. ....................................@....................................S.................................................................................... ............... ..H............text...4o... ...p.................. ..`.reloc...............r..............@..B................................................................H.......................................................................&.(......**..(......*.s.........s ........s!........s".........*.0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                                  Process:C:\Users\user\Desktop\L363rVr7oL.exe
                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):95232
                                  Entropy (8bit):5.566087372113848
                                  Encrypted:false
                                  SSDEEP:1536:oGlTr1IDavlZhbSc39YdjEwzGi1dDhDrgS:oGlSDavlZI8mqi1dtk
                                  MD5:2162D29EB849E9C799F3A951E52C9D4D
                                  SHA1:386CB6A7CF616DBCE0823F6FF23C1CBCB1D302E5
                                  SHA-256:150046FC66A80E4668FC08417E422C5F97489831823C898B50CA4ED6BC5A6F12
                                  SHA-512:64CE9074FE48C0A7BD640FF9F00F56DA340F0CC2D13E34C3AA5BCCF00F675287B02E7AAA73252669FF9591D646B9C400E0AF11EFE710CCCECA4AEED59D7A323A
                                  Malicious:true
                                  Yara Hits:
                                  • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Users\user\AppData\Local\Temp\server.exe, Author: Joe Security
                                  • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\Users\user\AppData\Local\Temp\server.exe, Author: unknown
                                  • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: C:\Users\user\AppData\Local\Temp\server.exe, Author: Florian Roth
                                  • Rule: crimeware_njrat_strings, Description: Detects njRAT based on some strings, Source: C:\Users\user\AppData\Local\Temp\server.exe, Author: Sekoia.io
                                  • Rule: Njrat, Description: detect njRAT in memory, Source: C:\Users\user\AppData\Local\Temp\server.exe, Author: JPCERT/CC Incident Response Group
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Local\Temp\server.exe, Author: ditekSHen
                                  Antivirus:
                                  • Antivirus: Avira, Detection: 100%
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: ReversingLabs, Detection: 87%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...?.dg.................p............... ........@.. ....................................@....................................S.................................................................................... ............... ..H............text...4o... ...p.................. ..`.reloc...............r..............@..B................................................................H.......................................................................&.(......**..(......*.s.........s ........s!........s".........*.0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                                  Process:C:\Users\user\AppData\Local\Temp\server.exe
                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):95232
                                  Entropy (8bit):5.566087372113848
                                  Encrypted:false
                                  SSDEEP:1536:oGlTr1IDavlZhbSc39YdjEwzGi1dDhDrgS:oGlSDavlZI8mqi1dtk
                                  MD5:2162D29EB849E9C799F3A951E52C9D4D
                                  SHA1:386CB6A7CF616DBCE0823F6FF23C1CBCB1D302E5
                                  SHA-256:150046FC66A80E4668FC08417E422C5F97489831823C898B50CA4ED6BC5A6F12
                                  SHA-512:64CE9074FE48C0A7BD640FF9F00F56DA340F0CC2D13E34C3AA5BCCF00F675287B02E7AAA73252669FF9591D646B9C400E0AF11EFE710CCCECA4AEED59D7A323A
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 87%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...?.dg.................p............... ........@.. ....................................@....................................S.................................................................................... ............... ..H............text...4o... ...p.................. ..`.reloc...............r..............@..B................................................................H.......................................................................&.(......**..(......*.s.........s ........s!........s".........*.0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                                  Process:C:\Users\user\AppData\Local\Temp\server.exe
                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):95232
                                  Entropy (8bit):5.566087372113848
                                  Encrypted:false
                                  SSDEEP:1536:oGlTr1IDavlZhbSc39YdjEwzGi1dDhDrgS:oGlSDavlZI8mqi1dtk
                                  MD5:2162D29EB849E9C799F3A951E52C9D4D
                                  SHA1:386CB6A7CF616DBCE0823F6FF23C1CBCB1D302E5
                                  SHA-256:150046FC66A80E4668FC08417E422C5F97489831823C898B50CA4ED6BC5A6F12
                                  SHA-512:64CE9074FE48C0A7BD640FF9F00F56DA340F0CC2D13E34C3AA5BCCF00F675287B02E7AAA73252669FF9591D646B9C400E0AF11EFE710CCCECA4AEED59D7A323A
                                  Malicious:true
                                  Yara Hits:
                                  • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, Author: Joe Security
                                  • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, Author: unknown
                                  • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, Author: Florian Roth
                                  • Rule: crimeware_njrat_strings, Description: Detects njRAT based on some strings, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, Author: Sekoia.io
                                  • Rule: Njrat, Description: detect njRAT in memory, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, Author: JPCERT/CC Incident Response Group
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, Author: ditekSHen
                                  Antivirus:
                                  • Antivirus: Avira, Detection: 100%
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: ReversingLabs, Detection: 87%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...?.dg.................p............... ........@.. ....................................@....................................S.................................................................................... ............... ..H............text...4o... ...p.................. ..`.reloc...............r..............@..B................................................................H.......................................................................&.(......**..(......*.s.........s ........s!........s".........*.0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                                  Process:C:\Users\user\AppData\Local\Temp\server.exe
                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):95232
                                  Entropy (8bit):5.566087372113848
                                  Encrypted:false
                                  SSDEEP:1536:oGlTr1IDavlZhbSc39YdjEwzGi1dDhDrgS:oGlSDavlZI8mqi1dtk
                                  MD5:2162D29EB849E9C799F3A951E52C9D4D
                                  SHA1:386CB6A7CF616DBCE0823F6FF23C1CBCB1D302E5
                                  SHA-256:150046FC66A80E4668FC08417E422C5F97489831823C898B50CA4ED6BC5A6F12
                                  SHA-512:64CE9074FE48C0A7BD640FF9F00F56DA340F0CC2D13E34C3AA5BCCF00F675287B02E7AAA73252669FF9591D646B9C400E0AF11EFE710CCCECA4AEED59D7A323A
                                  Malicious:true
                                  Yara Hits:
                                  • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exe, Author: Joe Security
                                  • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exe, Author: unknown
                                  • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exe, Author: Florian Roth
                                  • Rule: crimeware_njrat_strings, Description: Detects njRAT based on some strings, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exe, Author: Sekoia.io
                                  • Rule: Njrat, Description: detect njRAT in memory, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exe, Author: JPCERT/CC Incident Response Group
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exe, Author: ditekSHen
                                  Antivirus:
                                  • Antivirus: Avira, Detection: 100%
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: ReversingLabs, Detection: 87%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...?.dg.................p............... ........@.. ....................................@....................................S.................................................................................... ............... ..H............text...4o... ...p.................. ..`.reloc...............r..............@..B................................................................H.......................................................................&.(......**..(......*.s.........s ........s!........s".........*.0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                                  Process:C:\Users\user\Desktop\L363rVr7oL.exe
                                  File Type:Unicode text, UTF-8 (with BOM) text, with no line terminators
                                  Category:dropped
                                  Size (bytes):5
                                  Entropy (8bit):2.321928094887362
                                  Encrypted:false
                                  SSDEEP:3:j:j
                                  MD5:CAC4598FDC0F92181616D12833EB6CA1
                                  SHA1:80A7B7A46A0E8E674B782B9EB569E5430A69C84B
                                  SHA-256:275918973C23AD700F278C69CC03C9C82EC9F4D9ED0F53111AD22BEC197FF440
                                  SHA-512:01A7556BFCCE6D9D8251AADC7F6E6169FDD0477D487CE88729C44BFE8B85B2EEE500985D553C0479765EF5B5C6DC3517C0305EFB9089814C3F8A9EA6FC51C713
                                  Malicious:false
                                  Preview:.25
                                  Process:C:\Users\user\AppData\Local\Temp\server.exe
                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):95232
                                  Entropy (8bit):5.566087372113848
                                  Encrypted:false
                                  SSDEEP:1536:oGlTr1IDavlZhbSc39YdjEwzGi1dDhDrgS:oGlSDavlZI8mqi1dtk
                                  MD5:2162D29EB849E9C799F3A951E52C9D4D
                                  SHA1:386CB6A7CF616DBCE0823F6FF23C1CBCB1D302E5
                                  SHA-256:150046FC66A80E4668FC08417E422C5F97489831823C898B50CA4ED6BC5A6F12
                                  SHA-512:64CE9074FE48C0A7BD640FF9F00F56DA340F0CC2D13E34C3AA5BCCF00F675287B02E7AAA73252669FF9591D646B9C400E0AF11EFE710CCCECA4AEED59D7A323A
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 87%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...?.dg.................p............... ........@.. ....................................@....................................S.................................................................................... ............... ..H............text...4o... ...p.................. ..`.reloc...............r..............@..B................................................................H.......................................................................&.(......**..(......*.s.........s ........s!........s".........*.0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                                  Process:C:\Users\user\AppData\Local\Temp\server.exe
                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):95232
                                  Entropy (8bit):5.566087372113848
                                  Encrypted:false
                                  SSDEEP:1536:oGlTr1IDavlZhbSc39YdjEwzGi1dDhDrgS:oGlSDavlZI8mqi1dtk
                                  MD5:2162D29EB849E9C799F3A951E52C9D4D
                                  SHA1:386CB6A7CF616DBCE0823F6FF23C1CBCB1D302E5
                                  SHA-256:150046FC66A80E4668FC08417E422C5F97489831823C898B50CA4ED6BC5A6F12
                                  SHA-512:64CE9074FE48C0A7BD640FF9F00F56DA340F0CC2D13E34C3AA5BCCF00F675287B02E7AAA73252669FF9591D646B9C400E0AF11EFE710CCCECA4AEED59D7A323A
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 87%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...?.dg.................p............... ........@.. ....................................@....................................S.................................................................................... ............... ..H............text...4o... ...p.................. ..`.reloc...............r..............@..B................................................................H.......................................................................&.(......**..(......*.s.........s ........s!........s".........*.0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                                  Process:C:\Windows\SysWOW64\netsh.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):313
                                  Entropy (8bit):4.971939296804078
                                  Encrypted:false
                                  SSDEEP:6:/ojfKsUTGN8Ypox42k9L+DbGMKeQE+vigqAZs2E+AYeDPO+Yswyha:wjPIGNrkHk9iaeIM6ADDPOHyha
                                  MD5:689E2126A85BF55121488295EE068FA1
                                  SHA1:09BAAA253A49D80C18326DFBCA106551EBF22DD6
                                  SHA-256:D968A966EF474068E41256321F77807A042F1965744633D37A203A705662EC25
                                  SHA-512:C3736A8FC7E6573FA1B26FE6A901C05EE85C55A4A276F8F569D9EADC9A58BEC507D1BB90DBF9EA62AE79A6783178C69304187D6B90441D82E46F5F56172B5C5C
                                  Malicious:false
                                  Preview:..IMPORTANT: Command executed successfully...However, "netsh firewall" is deprecated;..use "netsh advfirewall firewall" instead...For more information on using "netsh advfirewall firewall" commands..instead of "netsh firewall", see KB article 947709..at https://go.microsoft.com/fwlink/?linkid=121488 .....Ok.....
                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Entropy (8bit):5.566087372113848
                                  TrID:
                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                  • Win32 Executable (generic) a (10002005/4) 49.75%
                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                  • Windows Screen Saver (13104/52) 0.07%
                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                  File name:L363rVr7oL.exe
                                  File size:95'232 bytes
                                  MD5:2162d29eb849e9c799f3a951e52c9d4d
                                  SHA1:386cb6a7cf616dbce0823f6ff23c1cbcb1d302e5
                                  SHA256:150046fc66a80e4668fc08417e422c5f97489831823c898b50ca4ed6bc5a6f12
                                  SHA512:64ce9074fe48c0a7bd640ff9f00f56da340f0cc2d13e34c3aa5bccf00f675287b02e7aaa73252669ff9591d646b9c400e0af11efe710ccceca4aeed59d7a323a
                                  SSDEEP:1536:oGlTr1IDavlZhbSc39YdjEwzGi1dDhDrgS:oGlSDavlZI8mqi1dtk
                                  TLSH:E393D74977E96524E0BF56F79471F2404E34B44B1602E3DE48E219AA1B33AC44F89FEB
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...?.dg.................p............... ........@.. ....................................@................................
                                  Icon Hash:90cececece8e8eb0
                                  Entrypoint:0x418f2e
                                  Entrypoint Section:.text
                                  Digitally signed:false
                                  Imagebase:0x400000
                                  Subsystem:windows gui
                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                  Time Stamp:0x6764BD3F [Fri Dec 20 00:41:35 2024 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:4
                                  OS Version Minor:0
                                  File Version Major:4
                                  File Version Minor:0
                                  Subsystem Version Major:4
                                  Subsystem Version Minor:0
                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                  Instruction
                                  jmp dword ptr [00402000h]
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x18ed80x53.text
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x1a0000xc.reloc
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x20000x16f340x1700061956d34bc5d78a30332736e7e6adbc1False0.3681746773097826data5.597769782353942IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .reloc0x1a0000xc0x200e48d2faea29e6ca7099ba682bb7e1db9False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                  DLLImport
                                  mscoree.dll_CorExeMain
                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                  2024-12-25T06:22:05.558040+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.449730147.185.221.2437290TCP
                                  2024-12-25T06:22:05.558040+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.449730147.185.221.2437290TCP
                                  2024-12-25T06:22:10.893760+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.449730147.185.221.2437290TCP
                                  TimestampSource PortDest PortSource IPDest IP
                                  Dec 25, 2024 06:22:05.271116972 CET4973037290192.168.2.4147.185.221.24
                                  Dec 25, 2024 06:22:05.390943050 CET3729049730147.185.221.24192.168.2.4
                                  Dec 25, 2024 06:22:05.391037941 CET4973037290192.168.2.4147.185.221.24
                                  Dec 25, 2024 06:22:05.558039904 CET4973037290192.168.2.4147.185.221.24
                                  Dec 25, 2024 06:22:05.677766085 CET3729049730147.185.221.24192.168.2.4
                                  Dec 25, 2024 06:22:05.677862883 CET4973037290192.168.2.4147.185.221.24
                                  Dec 25, 2024 06:22:05.797574043 CET3729049730147.185.221.24192.168.2.4
                                  Dec 25, 2024 06:22:10.893759966 CET4973037290192.168.2.4147.185.221.24
                                  Dec 25, 2024 06:22:11.013561010 CET3729049730147.185.221.24192.168.2.4
                                  Dec 25, 2024 06:22:12.741012096 CET3729049730147.185.221.24192.168.2.4
                                  Dec 25, 2024 06:22:12.747204065 CET4973037290192.168.2.4147.185.221.24
                                  Dec 25, 2024 06:22:12.866935015 CET3729049730147.185.221.24192.168.2.4
                                  Dec 25, 2024 06:22:30.745570898 CET3729049730147.185.221.24192.168.2.4
                                  Dec 25, 2024 06:22:30.748234987 CET4973037290192.168.2.4147.185.221.24
                                  Dec 25, 2024 06:22:30.867980957 CET3729049730147.185.221.24192.168.2.4
                                  Dec 25, 2024 06:22:48.765450954 CET3729049730147.185.221.24192.168.2.4
                                  Dec 25, 2024 06:22:48.765724897 CET4973037290192.168.2.4147.185.221.24
                                  Dec 25, 2024 06:22:48.885437012 CET3729049730147.185.221.24192.168.2.4
                                  Dec 25, 2024 06:23:06.862919092 CET3729049730147.185.221.24192.168.2.4
                                  Dec 25, 2024 06:23:06.863156080 CET4973037290192.168.2.4147.185.221.24
                                  Dec 25, 2024 06:23:06.982745886 CET3729049730147.185.221.24192.168.2.4
                                  Dec 25, 2024 06:23:24.845117092 CET3729049730147.185.221.24192.168.2.4
                                  Dec 25, 2024 06:23:24.845402956 CET4973037290192.168.2.4147.185.221.24
                                  Dec 25, 2024 06:23:24.965039015 CET3729049730147.185.221.24192.168.2.4
                                  Dec 25, 2024 06:23:42.890005112 CET3729049730147.185.221.24192.168.2.4
                                  Dec 25, 2024 06:23:42.890882969 CET4973037290192.168.2.4147.185.221.24
                                  Dec 25, 2024 06:23:43.010442019 CET3729049730147.185.221.24192.168.2.4
                                  Dec 25, 2024 06:24:00.929874897 CET3729049730147.185.221.24192.168.2.4
                                  Dec 25, 2024 06:24:00.930094957 CET4973037290192.168.2.4147.185.221.24
                                  Dec 25, 2024 06:24:01.049678087 CET3729049730147.185.221.24192.168.2.4
                                  Dec 25, 2024 06:24:18.991259098 CET3729049730147.185.221.24192.168.2.4
                                  Dec 25, 2024 06:24:18.993832111 CET4973037290192.168.2.4147.185.221.24
                                  Dec 25, 2024 06:24:19.113857031 CET3729049730147.185.221.24192.168.2.4
                                  Dec 25, 2024 06:24:37.009954929 CET3729049730147.185.221.24192.168.2.4
                                  Dec 25, 2024 06:24:37.010262012 CET4973037290192.168.2.4147.185.221.24
                                  Dec 25, 2024 06:24:37.129859924 CET3729049730147.185.221.24192.168.2.4
                                  Dec 25, 2024 06:24:54.999661922 CET3729049730147.185.221.24192.168.2.4
                                  Dec 25, 2024 06:24:54.999946117 CET4973037290192.168.2.4147.185.221.24
                                  Dec 25, 2024 06:24:55.119740963 CET3729049730147.185.221.24192.168.2.4
                                  Dec 25, 2024 06:25:13.064650059 CET3729049730147.185.221.24192.168.2.4
                                  Dec 25, 2024 06:25:13.064943075 CET4973037290192.168.2.4147.185.221.24
                                  Dec 25, 2024 06:25:13.184617996 CET3729049730147.185.221.24192.168.2.4
                                  Dec 25, 2024 06:25:31.124758959 CET3729049730147.185.221.24192.168.2.4
                                  Dec 25, 2024 06:25:31.125039101 CET4973037290192.168.2.4147.185.221.24
                                  Dec 25, 2024 06:25:31.244745016 CET3729049730147.185.221.24192.168.2.4
                                  Dec 25, 2024 06:25:49.159647942 CET3729049730147.185.221.24192.168.2.4
                                  Dec 25, 2024 06:25:49.159897089 CET4973037290192.168.2.4147.185.221.24
                                  Dec 25, 2024 06:25:49.279597998 CET3729049730147.185.221.24192.168.2.4

                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Click to jump to process

                                  Target ID:0
                                  Start time:00:21:55
                                  Start date:25/12/2024
                                  Path:C:\Users\user\Desktop\L363rVr7oL.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\Desktop\L363rVr7oL.exe"
                                  Imagebase:0x80000
                                  File size:95'232 bytes
                                  MD5 hash:2162D29EB849E9C799F3A951E52C9D4D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000000.00000002.1704428155.00000000036C8000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: 00000000.00000002.1704428155.00000000036C8000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                  • Rule: Njrat, Description: detect njRAT in memory, Source: 00000000.00000002.1704428155.00000000036C8000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                  • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000000.00000000.1677861095.0000000000082000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: 00000000.00000000.1677861095.0000000000082000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                                  • Rule: Njrat, Description: detect njRAT in memory, Source: 00000000.00000000.1677861095.0000000000082000.00000002.00000001.01000000.00000003.sdmp, Author: JPCERT/CC Incident Response Group
                                  Reputation:low
                                  Has exited:true

                                  Target ID:1
                                  Start time:00:21:57
                                  Start date:25/12/2024
                                  Path:C:\Users\user\AppData\Local\Temp\server.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\AppData\Local\Temp\server.exe"
                                  Imagebase:0x30000
                                  File size:95'232 bytes
                                  MD5 hash:2162D29EB849E9C799F3A951E52C9D4D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Users\user\AppData\Local\Temp\server.exe, Author: Joe Security
                                  • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\Users\user\AppData\Local\Temp\server.exe, Author: unknown
                                  • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: C:\Users\user\AppData\Local\Temp\server.exe, Author: Florian Roth
                                  • Rule: crimeware_njrat_strings, Description: Detects njRAT based on some strings, Source: C:\Users\user\AppData\Local\Temp\server.exe, Author: Sekoia.io
                                  • Rule: Njrat, Description: detect njRAT in memory, Source: C:\Users\user\AppData\Local\Temp\server.exe, Author: JPCERT/CC Incident Response Group
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Local\Temp\server.exe, Author: ditekSHen
                                  Antivirus matches:
                                  • Detection: 100%, Avira
                                  • Detection: 100%, Joe Sandbox ML
                                  • Detection: 87%, ReversingLabs
                                  Reputation:low
                                  Has exited:false

                                  Target ID:2
                                  Start time:00:21:59
                                  Start date:25/12/2024
                                  Path:C:\Windows\SysWOW64\netsh.exe
                                  Wow64 process (32bit):true
                                  Commandline:netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\server.exe" "server.exe" ENABLE
                                  Imagebase:0x1560000
                                  File size:82'432 bytes
                                  MD5 hash:4E89A1A088BE715D6C946E55AB07C7DF
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:3
                                  Start time:00:21:59
                                  Start date:25/12/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff7699e0000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:4
                                  Start time:00:22:01
                                  Start date:25/12/2024
                                  Path:C:\Windows\SysWOW64\netsh.exe
                                  Wow64 process (32bit):true
                                  Commandline:netsh firewall delete allowedprogram "C:\Users\user\AppData\Local\Temp\server.exe"
                                  Imagebase:0x1560000
                                  File size:82'432 bytes
                                  MD5 hash:4E89A1A088BE715D6C946E55AB07C7DF
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:5
                                  Start time:00:22:01
                                  Start date:25/12/2024
                                  Path:C:\Windows\SysWOW64\netsh.exe
                                  Wow64 process (32bit):true
                                  Commandline:netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\server.exe" "server.exe" ENABLE
                                  Imagebase:0x1560000
                                  File size:82'432 bytes
                                  MD5 hash:4E89A1A088BE715D6C946E55AB07C7DF
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:6
                                  Start time:00:22:01
                                  Start date:25/12/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff7699e0000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:7
                                  Start time:00:22:01
                                  Start date:25/12/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff7699e0000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:8
                                  Start time:00:22:10
                                  Start date:25/12/2024
                                  Path:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exe
                                  Wow64 process (32bit):false
                                  Commandline:"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exe"
                                  Imagebase:0x490000
                                  File size:95'232 bytes
                                  MD5 hash:2162D29EB849E9C799F3A951E52C9D4D
                                  Has elevated privileges:false
                                  Has administrator privileges:false
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exe, Author: Joe Security
                                  • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exe, Author: unknown
                                  • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exe, Author: Florian Roth
                                  • Rule: crimeware_njrat_strings, Description: Detects njRAT based on some strings, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exe, Author: Sekoia.io
                                  • Rule: Njrat, Description: detect njRAT in memory, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exe, Author: JPCERT/CC Incident Response Group
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exe, Author: ditekSHen
                                  Antivirus matches:
                                  • Detection: 100%, Avira
                                  • Detection: 100%, Joe Sandbox ML
                                  • Detection: 87%, ReversingLabs
                                  Reputation:low
                                  Has exited:true

                                  Target ID:11
                                  Start time:00:22:10
                                  Start date:25/12/2024
                                  Path:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4d560bc8f8d17c6ed1c6a55f7fdc2b2Windows Update.exe"
                                  Imagebase:0xd80000
                                  File size:95'232 bytes
                                  MD5 hash:2162D29EB849E9C799F3A951E52C9D4D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:low
                                  Has exited:true

                                  Target ID:13
                                  Start time:00:22:18
                                  Start date:25/12/2024
                                  Path:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe"
                                  Imagebase:0x6a0000
                                  File size:95'232 bytes
                                  MD5 hash:2162D29EB849E9C799F3A951E52C9D4D
                                  Has elevated privileges:false
                                  Has administrator privileges:false
                                  Programmed in:C, C++ or other language
                                  Antivirus matches:
                                  • Detection: 87%, ReversingLabs
                                  Reputation:low
                                  Has exited:true

                                  Target ID:15
                                  Start time:00:22:18
                                  Start date:25/12/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff7699e0000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:false
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:16
                                  Start time:00:22:26
                                  Start date:25/12/2024
                                  Path:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe"
                                  Imagebase:0xe40000
                                  File size:95'232 bytes
                                  MD5 hash:2162D29EB849E9C799F3A951E52C9D4D
                                  Has elevated privileges:false
                                  Has administrator privileges:false
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, Author: Joe Security
                                  • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, Author: unknown
                                  • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, Author: Florian Roth
                                  • Rule: crimeware_njrat_strings, Description: Detects njRAT based on some strings, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, Author: Sekoia.io
                                  • Rule: Njrat, Description: detect njRAT in memory, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, Author: JPCERT/CC Incident Response Group
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, Author: ditekSHen
                                  Antivirus matches:
                                  • Detection: 100%, Avira
                                  • Detection: 100%, Joe Sandbox ML
                                  • Detection: 87%, ReversingLabs
                                  Reputation:low
                                  Has exited:true

                                  Reset < >

                                    Execution Graph

                                    Execution Coverage:2.2%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:0%
                                    Total number of Nodes:58
                                    Total number of Limit Nodes:4
                                    execution_graph 13558 68b06a 13560 68b0a2 CreateMutexW 13558->13560 13561 68b0e5 13560->13561 13569 68aeae 13572 68aee3 WriteFile 13569->13572 13571 68af15 13572->13571 13629 68a6ce 13630 68a72e OleGetClipboard 13629->13630 13632 68a78c 13630->13632 13613 68b424 13615 68b446 ShellExecuteExW 13613->13615 13616 68b488 13615->13616 13573 68b446 13575 68b46c ShellExecuteExW 13573->13575 13576 68b488 13575->13576 13577 68aaa6 13580 68aade CreateFileW 13577->13580 13579 68ab2d 13580->13579 13581 68a59a 13582 68a5d8 DuplicateHandle 13581->13582 13583 68a610 13581->13583 13584 68a5e6 13582->13584 13583->13582 13597 68ab7c 13598 68abbe CloseHandle 13597->13598 13600 68abf8 13598->13600 13585 68a65e 13586 68a68a OleInitialize 13585->13586 13587 68a6c0 13585->13587 13588 68a698 13586->13588 13587->13586 13589 68abbe 13590 68ac29 13589->13590 13591 68abea CloseHandle 13589->13591 13590->13591 13592 68abf8 13591->13592 13625 68a61e 13627 68a65e OleInitialize 13625->13627 13628 68a698 13627->13628 13633 68a9bf 13634 68a9c9 SetErrorMode 13633->13634 13636 68aa53 13634->13636 13593 68aa12 13594 68aa3e SetErrorMode 13593->13594 13595 68aa67 13593->13595 13596 68aa53 13594->13596 13595->13594 13601 68a573 13602 68a59a DuplicateHandle 13601->13602 13604 68a5e6 13602->13604 13605 68aa75 13606 68aaa6 CreateFileW 13605->13606 13608 68ab2d 13606->13608 13617 68b036 13618 68b06a CreateMutexW 13617->13618 13620 68b0e5 13618->13620 13609 68ae77 13610 68aeae WriteFile 13609->13610 13612 68af15 13610->13612 13621 68ac37 13622 68ac6a GetFileType 13621->13622 13624 68accc 13622->13624

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 0 4864298-48642c9 2 4864352-486435a 0->2 3 48642cf-4864350 0->3 4 4864366-486437a 2->4 3->2 31 486435c 3->31 5 4864380-48643bc 4->5 6 486452f-486467d 4->6 17 48643be-48643e6 5->17 18 48643ed-48644ea 5->18 43 4864683-48647d2 6->43 44 486480d-4864821 6->44 17->18 140 48644ef 18->140 31->4 43->44 46 4864827-4864934 44->46 47 486496f-4864983 44->47 46->47 49 48649d6-48649ea 47->49 50 4864985-486499b call 4864210 47->50 54 4864a32-4864a46 49->54 55 48649ec-48649f7 49->55 50->49 58 4864b94-4864ba8 54->58 59 4864a4c-4864b59 54->59 55->54 63 4864cd4-4864ce8 58->63 64 4864bae-4864bc2 58->64 59->58 71 4864f74-4864f88 63->71 72 4864cee-4864f2d 63->72 65 4864bc4-4864bcb 64->65 66 4864bd0-4864be4 64->66 75 4864c48-4864c5c 65->75 76 4864be6-4864bed 66->76 77 4864bef-4864c03 66->77 73 4864fe2-4864ff6 71->73 74 4864f8a-4864f9b 71->74 72->71 83 4865045-4865059 73->83 84 4864ff8-4864ffe 73->84 74->73 80 4864c76-4864c82 75->80 81 4864c5e-4864c74 75->81 76->75 86 4864c05-4864c0c 77->86 87 4864c0e-4864c22 77->87 90 4864c8d 80->90 81->90 91 48650a2-48650b6 83->91 92 486505b 83->92 84->83 86->75 94 4864c24-4864c2b 87->94 95 4864c2d-4864c41 87->95 90->63 99 486512d-4865141 91->99 100 48650b8-48650e1 91->100 92->91 94->75 95->75 104 4864c43-4864c45 95->104 106 4865147-4865363 99->106 107 48653b4-48653c8 99->107 100->99 104->75 490 4865367 106->490 491 4865365 106->491 114 486549e-48654b2 107->114 115 48653ce-4865457 107->115 118 486566f-4865683 114->118 119 48654b8-4865628 114->119 115->114 123 48657e6-48657fa 118->123 124 4865689-486579f 118->124 119->118 129 4865800-4865916 123->129 130 486595d-4865971 123->130 124->123 129->130 136 4865977-4865a8d 130->136 137 4865ad4-4865ae8 130->137 136->137 145 4865aee-4865c04 137->145 146 4865c4b-4865c5f 137->146 140->6 145->146 153 4865c65-4865d7b 146->153 154 4865dc2-4865dd6 146->154 153->154 158 4865ddc-4865ef2 154->158 159 4865f39-4865f4d 154->159 158->159 166 4865f53-4866069 159->166 167 48660b0-48660c4 159->167 166->167 173 4866227-486623b 167->173 174 48660ca-48661e0 167->174 182 4866241-4866357 173->182 183 486639e-48663b2 173->183 174->173 182->183 191 4866536-486654a 183->191 192 48663b8-48663fd call 4864278 183->192 204 4866550-486656f 191->204 205 486668d-48666a1 191->205 325 48664bd-48664df 192->325 239 4866614-4866636 204->239 217 48666a7-48667a7 205->217 218 48667ee-4866802 205->218 217->218 227 486694f-4866963 218->227 228 4866808-4866908 218->228 234 4866ab0-4866ada 227->234 235 4866969-4866a69 227->235 228->227 266 4866ae0-4866b53 234->266 267 4866b9a-4866bae 234->267 235->234 250 4866574-4866583 239->250 251 486663c 239->251 264 486663e 250->264 265 4866589-48665bc 250->265 251->205 286 4866643-486668b 264->286 357 4866603-486660c 265->357 358 48665be-48665f8 265->358 266->267 271 4866bb4-4866c44 267->271 272 4866c8b-4866c9f 267->272 271->272 288 4866de5-4866df9 272->288 289 4866ca5-4866d9e 272->289 286->205 298 4866dff-4866e4f 288->298 299 486705c-4867070 288->299 289->288 419 4866e51-4866e77 298->419 420 4866ebd-4866ee8 298->420 310 4867076-4867111 call 4864278 * 2 299->310 311 4867158-486715f 299->311 310->311 337 48664e5 325->337 338 4866402-4866411 325->338 337->191 354 48664e7 338->354 355 4866417-48664b5 338->355 380 48664ec-4866534 354->380 355->380 494 48664b7 355->494 357->286 365 486660e 357->365 358->357 365->239 380->191 486 4866eb8 419->486 487 4866e79-4866e99 419->487 492 4866fc6-4867057 420->492 493 4866eee-4866fc1 420->493 486->299 487->486 497 486536d 490->497 491->497 492->299 493->299 494->325 497->107
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1704558204.0000000004860000.00000040.00000800.00020000.00000000.sdmp, Offset: 04860000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4860000_L363rVr7oL.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: @$\Ok$|ti$2k
                                    • API String ID: 0-1448379396
                                    • Opcode ID: a3e6f8026688b973000b8e91edb0ed4b29c6d4540b665401ff93fdc3b2279f15
                                    • Instruction ID: 75cf77f2a7b1067652612823fe7242f38fe04848f9ea8290a187874061919056
                                    • Opcode Fuzzy Hash: a3e6f8026688b973000b8e91edb0ed4b29c6d4540b665401ff93fdc3b2279f15
                                    • Instruction Fuzzy Hash: 89235D74A11128CFDB25EF34D964BADB7B2BB49304F1041EAD909A7399DB399E81CF40

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 555 4860879-4860898 567 486089a call c60606 555->567 568 486089a call c605df 555->568 556 48608a0-4860920 567->556 568->556
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1704558204.0000000004860000.00000040.00000800.00020000.00000000.sdmp, Offset: 04860000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4860000_L363rVr7oL.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: HQi$XRi$Pi
                                    • API String ID: 0-3528959962
                                    • Opcode ID: 577c861c0384496d98f4c2dd0ec4e05955cb1f7df9ee59504e33e90c637e869b
                                    • Instruction ID: c03b290c762ed677d98e7b0798e4a16e821f4be44552918c4022900c78108630
                                    • Opcode Fuzzy Hash: 577c861c0384496d98f4c2dd0ec4e05955cb1f7df9ee59504e33e90c637e869b
                                    • Instruction Fuzzy Hash: 910184301153428FCB11FF38D65895D7BE6AFC5348B00592DE485CBB6AEB389945CB43

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 569 4863802-4863911 586 4863917-4863919 569->586 587 4863913 569->587 590 4863920-4863927 586->590 588 4863915 587->588 589 486391b 587->589 588->586 589->590 591 48639bd-4863adf 590->591 592 486392d-48639b2 590->592 616 4863ae1-4863b51 591->616 617 4863b5b-4863bae 591->617 592->591 616->617 624 4863bb5 617->624 625 4863bb0 617->625 705 4863bb5 call c60606 624->705 706 4863bb5 call c605df 624->706 707 4863bb5 call 4864298 624->707 625->624 627 4863bbb-4863bcf 628 4863c06-4863cbb 627->628 629 4863bd1-4863bfb 627->629 640 4863d43 628->640 641 4863cc1-4863cff 628->641 629->628 642 48641dd-48641e8 640->642 641->640 644 48641ee-48641f5 642->644 645 4863d48-4863d66 642->645 648 4863d71-4863d7c 645->648 649 4863d68-4863d6e 645->649 653 4863d82-4863d96 648->653 654 4864193-48641db 648->654 649->648 655 4863e0e-4863e1f 653->655 656 4863d98-4863dca 653->656 654->642 657 4863e21-4863e4b 655->657 658 4863e6f-4863e7d 655->658 656->655 657->658 669 4863e4d-4863e67 657->669 661 4863e83-4863f36 658->661 662 4864191 658->662 682 4863fc6-48640bd 661->682 683 4863f3c-4863fbf 661->683 662->642 669->658 698 48640c3-4864146 682->698 699 486414d 682->699 683->682 698->699 699->662 705->627 706->627 707->627
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1704558204.0000000004860000.00000040.00000800.00020000.00000000.sdmp, Offset: 04860000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4860000_L363rVr7oL.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \Ok$2k
                                    • API String ID: 0-3697909212
                                    • Opcode ID: ee603bdd82aabad3f49a81a40fe68b269552666193bbf2070086723463d276f4
                                    • Instruction ID: 562930ae27224849332daeb9be1d3f669ea6dd7c861ccd549c920baee38c8cd7
                                    • Opcode Fuzzy Hash: ee603bdd82aabad3f49a81a40fe68b269552666193bbf2070086723463d276f4
                                    • Instruction Fuzzy Hash: DF324D30A00218CFCB25EF74D855BEDB7B2AF49308F1045AAD40AAB399DB399D81CF40

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 708 48600b8-48600cd 735 48600d0 call c60606 708->735 736 48600d0 call 68a23a 708->736 737 48600d0 call 68a20c 708->737 738 48600d0 call c605df 708->738 710 48600d5-48600f7 713 486010b-48601d5 710->713 714 48600f9-486010a 710->714 730 48601d5 call c60606 713->730 731 48601d5 call 4863802 713->731 732 48601d5 call c605df 713->732 733 48601d5 call 48639bf 713->733 734 48601d5 call 4863b18 713->734 729 48601db-48601de 730->729 731->729 732->729 733->729 734->729 735->710 736->710 737->710 738->710
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1704558204.0000000004860000.00000040.00000800.00020000.00000000.sdmp, Offset: 04860000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4860000_L363rVr7oL.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 2k$2k
                                    • API String ID: 0-107389494
                                    • Opcode ID: 8017d81950d489db44bf7b24148b383a1fa4d6444fcd9563a95ad122595fabe5
                                    • Instruction ID: ff4973313bb90baa0fc8ed131d78e8c93c10cad6ace2fe34e06c51fd78db432a
                                    • Opcode Fuzzy Hash: 8017d81950d489db44bf7b24148b383a1fa4d6444fcd9563a95ad122595fabe5
                                    • Instruction Fuzzy Hash: B031F7317043405FDB15EB74982276D3BAB9B82258F2449BED041DF3D6CF7A5C4587A2

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 739 4860118-4860169 744 4860174-486017a 739->744 745 4860181-48601bd 744->745 750 48601c8-48601d5 745->750 753 48601d5 call c60606 750->753 754 48601d5 call 4863802 750->754 755 48601d5 call c605df 750->755 756 48601d5 call 48639bf 750->756 757 48601d5 call 4863b18 750->757 752 48601db-48601de 753->752 754->752 755->752 756->752 757->752
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1704558204.0000000004860000.00000040.00000800.00020000.00000000.sdmp, Offset: 04860000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4860000_L363rVr7oL.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 2k$2k
                                    • API String ID: 0-107389494
                                    • Opcode ID: 550fec86e903d61be2667205dbeefe5c02cfe1408a1ed198e305ddec91293732
                                    • Instruction ID: f1ec83f849b6405f530384af6499fb29bf7e4f5661c2a0bef85baeda6a68479b
                                    • Opcode Fuzzy Hash: 550fec86e903d61be2667205dbeefe5c02cfe1408a1ed198e305ddec91293732
                                    • Instruction Fuzzy Hash: E911E5347042504FC715BB78A4226B9279B5BC228872458BEC002DF35BCF7D8C4A87A2

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 758 68aa75-68aafe 762 68ab00 758->762 763 68ab03-68ab0f 758->763 762->763 764 68ab11 763->764 765 68ab14-68ab1d 763->765 764->765 766 68ab6e-68ab73 765->766 767 68ab1f-68ab43 CreateFileW 765->767 766->767 770 68ab75-68ab7a 767->770 771 68ab45-68ab6b 767->771 770->771
                                    APIs
                                    • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 0068AB25
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1703812694.000000000068A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0068A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_68a000_L363rVr7oL.jbxd
                                    Similarity
                                    • API ID: CreateFile
                                    • String ID:
                                    • API String ID: 823142352-0
                                    • Opcode ID: a2709a79813805c4f2c2ebc1ef7189e861ef0cba578280d61c215ee245a5014d
                                    • Instruction ID: 0528c558fcd5eca6a64c48d1151a539a50c840d15515f3b173e53835c5517173
                                    • Opcode Fuzzy Hash: a2709a79813805c4f2c2ebc1ef7189e861ef0cba578280d61c215ee245a5014d
                                    • Instruction Fuzzy Hash: 2731A071504380AFE721CF65DD84F96BBF8EF05320F0889AAE9858B652D375E808CB61

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 774 68b036-68b0b9 778 68b0bb 774->778 779 68b0be-68b0c7 774->779 778->779 780 68b0c9 779->780 781 68b0cc-68b0d5 779->781 780->781 782 68b126-68b12b 781->782 783 68b0d7-68b0fb CreateMutexW 781->783 782->783 786 68b12d-68b132 783->786 787 68b0fd-68b123 783->787 786->787
                                    APIs
                                    • CreateMutexW.KERNELBASE(?,?), ref: 0068B0DD
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1703812694.000000000068A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0068A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_68a000_L363rVr7oL.jbxd
                                    Similarity
                                    • API ID: CreateMutex
                                    • String ID:
                                    • API String ID: 1964310414-0
                                    • Opcode ID: 7f4cb2210f4fe7e4d21dcc8cfa4fb6255b54ed1e08f30b707b533bf959ec9b07
                                    • Instruction ID: ab67e82e09b03fe109628f5f0d54ffe17e453ee1cef27c2a701c45f7306df66a
                                    • Opcode Fuzzy Hash: 7f4cb2210f4fe7e4d21dcc8cfa4fb6255b54ed1e08f30b707b533bf959ec9b07
                                    • Instruction Fuzzy Hash: B031AFB15093806FE721DB25DD95B96BFF8EF06310F08849AE984CF293D374A908C762

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 790 68a6ce-68a72b 791 68a72e-68a786 OleGetClipboard 790->791 793 68a78c-68a7a2 791->793
                                    APIs
                                    • OleGetClipboard.OLE32(?,00000E24,?,?), ref: 0068A77E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1703812694.000000000068A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0068A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_68a000_L363rVr7oL.jbxd
                                    Similarity
                                    • API ID: Clipboard
                                    • String ID:
                                    • API String ID: 220874293-0
                                    • Opcode ID: d00899ec4ac458dac8f247e77328f36bddd5f475f5fcaca90cc9e8a7796ba92f
                                    • Instruction ID: d4e494b73444b83e801645731df14eb7e7f579c537c9f4e0a8f82d1113beec6e
                                    • Opcode Fuzzy Hash: d00899ec4ac458dac8f247e77328f36bddd5f475f5fcaca90cc9e8a7796ba92f
                                    • Instruction Fuzzy Hash: 9931807504D3C06FD3138B259C61B61BFB4EF47610F0A40DBE884CB6A3D2296919D7B2

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 794 68ae77-68af05 798 68af49-68af4e 794->798 799 68af07-68af27 WriteFile 794->799 798->799 802 68af29-68af46 799->802 803 68af50-68af55 799->803 803->802
                                    APIs
                                    • WriteFile.KERNELBASE(?,00000E24,E0613B62,00000000,00000000,00000000,00000000), ref: 0068AF0D
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1703812694.000000000068A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0068A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_68a000_L363rVr7oL.jbxd
                                    Similarity
                                    • API ID: FileWrite
                                    • String ID:
                                    • API String ID: 3934441357-0
                                    • Opcode ID: 60cbc0333467f2a0a44c73f93f95c30850a11d2233f498a258d064e237f292f3
                                    • Instruction ID: af9a59d56b751d21741272569059b6970344c938d8d2c25be193a67f63fd3e44
                                    • Opcode Fuzzy Hash: 60cbc0333467f2a0a44c73f93f95c30850a11d2233f498a258d064e237f292f3
                                    • Instruction Fuzzy Hash: C921B1B2409380AFE722CF55DD44F96BFB8EF06314F08859AE9849F162D234A908CB61

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 806 68aaa6-68aafe 809 68ab00 806->809 810 68ab03-68ab0f 806->810 809->810 811 68ab11 810->811 812 68ab14-68ab1d 810->812 811->812 813 68ab6e-68ab73 812->813 814 68ab1f-68ab27 CreateFileW 812->814 813->814 815 68ab2d-68ab43 814->815 817 68ab75-68ab7a 815->817 818 68ab45-68ab6b 815->818 817->818
                                    APIs
                                    • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 0068AB25
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1703812694.000000000068A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0068A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_68a000_L363rVr7oL.jbxd
                                    Similarity
                                    • API ID: CreateFile
                                    • String ID:
                                    • API String ID: 823142352-0
                                    • Opcode ID: bf30f45d9196b2adcef39b46239c0bc811ce4d002cf04c7868fdda2b8f9fc813
                                    • Instruction ID: 6101645a3b32c3c5c936d7e681966130fef0abc58d4161c3ddf67f6fb39736a7
                                    • Opcode Fuzzy Hash: bf30f45d9196b2adcef39b46239c0bc811ce4d002cf04c7868fdda2b8f9fc813
                                    • Instruction Fuzzy Hash: 9F219F71500200AFEB20DF69DD45BA6FBE9EF08320F04896AED458B751D375E808CB72

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 821 68a9bf-68aa3c 826 68aa3e-68aa51 SetErrorMode 821->826 827 68aa67-68aa6c 821->827 828 68aa6e-68aa73 826->828 829 68aa53-68aa66 826->829 827->826 828->829
                                    APIs
                                    • SetErrorMode.KERNELBASE(?), ref: 0068AA44
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1703812694.000000000068A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0068A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_68a000_L363rVr7oL.jbxd
                                    Similarity
                                    • API ID: ErrorMode
                                    • String ID:
                                    • API String ID: 2340568224-0
                                    • Opcode ID: ee7c8775259dedf724b777374653cf2f1ec0421015c3111745805fc14a67efcb
                                    • Instruction ID: 5925b14c61763c1acc107d39109dc8679cfc475c7b9bfbecccfddc6a5943ed14
                                    • Opcode Fuzzy Hash: ee7c8775259dedf724b777374653cf2f1ec0421015c3111745805fc14a67efcb
                                    • Instruction Fuzzy Hash: 8B217A7540E7C09FDB138B258C64A51BFB4AF17620F0E81DBD9848F6A3D1689C08C772

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 832 68ac37-68acb5 836 68acea-68acef 832->836 837 68acb7-68acca GetFileType 832->837 836->837 838 68accc-68ace9 837->838 839 68acf1-68acf6 837->839 839->838
                                    APIs
                                    • GetFileType.KERNELBASE(?,00000E24,E0613B62,00000000,00000000,00000000,00000000), ref: 0068ACBD
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1703812694.000000000068A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0068A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_68a000_L363rVr7oL.jbxd
                                    Similarity
                                    • API ID: FileType
                                    • String ID:
                                    • API String ID: 3081899298-0
                                    • Opcode ID: efcc29a56038d61f18001f6fc419d388ddb3379e366656911963f39fe104cdc9
                                    • Instruction ID: 5efaca705a710d85ed3654bf7100d1b4ebcb3007c8aee84385a236b8d010ac10
                                    • Opcode Fuzzy Hash: efcc29a56038d61f18001f6fc419d388ddb3379e366656911963f39fe104cdc9
                                    • Instruction Fuzzy Hash: 8121D5B54087806FE7228B55DC45BA2BFBCDF46314F0885DBE9848F293D264AD09D772

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 843 68b06a-68b0b9 846 68b0bb 843->846 847 68b0be-68b0c7 843->847 846->847 848 68b0c9 847->848 849 68b0cc-68b0d5 847->849 848->849 850 68b126-68b12b 849->850 851 68b0d7-68b0df CreateMutexW 849->851 850->851 853 68b0e5-68b0fb 851->853 854 68b12d-68b132 853->854 855 68b0fd-68b123 853->855 854->855
                                    APIs
                                    • CreateMutexW.KERNELBASE(?,?), ref: 0068B0DD
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1703812694.000000000068A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0068A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_68a000_L363rVr7oL.jbxd
                                    Similarity
                                    • API ID: CreateMutex
                                    • String ID:
                                    • API String ID: 1964310414-0
                                    • Opcode ID: a2a034682974e4f7d11208cc2ad18af32192030611a5fe6ea2b29e6157fbe04c
                                    • Instruction ID: 93a4e29a9b445e07e8bcada9c4019b39d4a6dd533b59db3d299850f169b12395
                                    • Opcode Fuzzy Hash: a2a034682974e4f7d11208cc2ad18af32192030611a5fe6ea2b29e6157fbe04c
                                    • Instruction Fuzzy Hash: E22192716002449FE720DF29DD45BA6FBE8EF08324F148969E9458B782D775E908CB72

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 858 68a61e-68a688 860 68a68a-68a692 OleInitialize 858->860 861 68a6c0-68a6c5 858->861 862 68a698-68a6aa 860->862 861->860 864 68a6ac-68a6bf 862->864 865 68a6c7-68a6cc 862->865 865->864
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1703812694.000000000068A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0068A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_68a000_L363rVr7oL.jbxd
                                    Similarity
                                    • API ID: Initialize
                                    • String ID:
                                    • API String ID: 2538663250-0
                                    • Opcode ID: 44312dc0971d4dca933e1a5054eb22894b5555cd19e5dd6174da03ecf1c64545
                                    • Instruction ID: b02fdb5805ce8339a1d98a498dec47aace88eca22ea31b2de97db1aa159f3092
                                    • Opcode Fuzzy Hash: 44312dc0971d4dca933e1a5054eb22894b5555cd19e5dd6174da03ecf1c64545
                                    • Instruction Fuzzy Hash: FE21497140D3C05FDB128B259C94692BFB49F07220F0984DBD9848F2A7D2695948C7B2

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 867 68a573-68a5d6 869 68a5d8-68a5e0 DuplicateHandle 867->869 870 68a610-68a615 867->870 871 68a5e6-68a5f8 869->871 870->869 873 68a5fa-68a60d 871->873 874 68a617-68a61c 871->874 874->873
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0068A5DE
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1703812694.000000000068A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0068A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_68a000_L363rVr7oL.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: ccf6a9b243b145082388c1ba2d54e16fc3e759e1207d0d9795821049d59391eb
                                    • Instruction ID: 1920fdaa276604123e86da717ffbc19dabe67c0a46d002647a3fbf205e893360
                                    • Opcode Fuzzy Hash: ccf6a9b243b145082388c1ba2d54e16fc3e759e1207d0d9795821049d59391eb
                                    • Instruction Fuzzy Hash: 7A11B771408780AFDB228F50DC44B62FFF4EF4A310F0888DAED858B562D235A818DB61
                                    APIs
                                    • WriteFile.KERNELBASE(?,00000E24,E0613B62,00000000,00000000,00000000,00000000), ref: 0068AF0D
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1703812694.000000000068A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0068A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_68a000_L363rVr7oL.jbxd
                                    Similarity
                                    • API ID: FileWrite
                                    • String ID:
                                    • API String ID: 3934441357-0
                                    • Opcode ID: 19eacbddb9a7ab546b82e5928d61404fc128ad5516d00a69b3ad255bfb1db3d3
                                    • Instruction ID: ed28677b28af17fd43e9b21c633712a146fee90c8840908f7f97ccb05747b151
                                    • Opcode Fuzzy Hash: 19eacbddb9a7ab546b82e5928d61404fc128ad5516d00a69b3ad255bfb1db3d3
                                    • Instruction Fuzzy Hash: 37110871500700AFE731DF55DD44FA6FBE8EF04310F14896AEE459B651D335A9088BB2
                                    APIs
                                    • ShellExecuteExW.SHELL32(?), ref: 0068B480
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1703812694.000000000068A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0068A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_68a000_L363rVr7oL.jbxd
                                    Similarity
                                    • API ID: ExecuteShell
                                    • String ID:
                                    • API String ID: 587946157-0
                                    • Opcode ID: 1ae46505a64c4ae1a59f10009fbbf409d09bfeddd932939e85ce43313ad5e5a8
                                    • Instruction ID: 7376d46dc286dd819f26d7be5a3effacd048213c129572054c9dc8728a18ebb2
                                    • Opcode Fuzzy Hash: 1ae46505a64c4ae1a59f10009fbbf409d09bfeddd932939e85ce43313ad5e5a8
                                    • Instruction Fuzzy Hash: 1D1160755093809FD712CF25DC95B52BFE8DF46220F0884EAED89CF257D274A948CB61
                                    APIs
                                    • GetFileType.KERNELBASE(?,00000E24,E0613B62,00000000,00000000,00000000,00000000), ref: 0068ACBD
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1703812694.000000000068A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0068A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_68a000_L363rVr7oL.jbxd
                                    Similarity
                                    • API ID: FileType
                                    • String ID:
                                    • API String ID: 3081899298-0
                                    • Opcode ID: 46febf6e6acf9492587ab0b55560b2b36bdb8dc027b08f4a3847272e0aec8b7f
                                    • Instruction ID: 0f8d13f95935e79f236ecc6d7e057764c387171cb53c1e8eb32c128a81ed8707
                                    • Opcode Fuzzy Hash: 46febf6e6acf9492587ab0b55560b2b36bdb8dc027b08f4a3847272e0aec8b7f
                                    • Instruction Fuzzy Hash: A1010071500200AFE7209B49DD85BA6BBA8DF04324F14C5AAEE058B741D278A8488AA2
                                    APIs
                                    • ShellExecuteExW.SHELL32(?), ref: 0068B480
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1703812694.000000000068A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0068A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_68a000_L363rVr7oL.jbxd
                                    Similarity
                                    • API ID: ExecuteShell
                                    • String ID:
                                    • API String ID: 587946157-0
                                    • Opcode ID: 3781decb301b9e8afdf879de3a8bd801583f2070c0ee0edd188e730b017755c9
                                    • Instruction ID: 03186fe032f3d76b4f6b4fb501ae2a537f7dbeb84f03c5770c313b1c2a33009d
                                    • Opcode Fuzzy Hash: 3781decb301b9e8afdf879de3a8bd801583f2070c0ee0edd188e730b017755c9
                                    • Instruction Fuzzy Hash: 690180716042448FEB10DF19D9857A6BBE8EF04720F08C4AADD49CB756D379E848CBA1
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0068A5DE
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1703812694.000000000068A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0068A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_68a000_L363rVr7oL.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: 7087df1753753cc173cbb26676bec63e9b2d8c3335bf62b41511e273a211ba44
                                    • Instruction ID: 13a06c15840d3cd350207d1d8277159b159a6c5bec5494c51ec0f016cd770539
                                    • Opcode Fuzzy Hash: 7087df1753753cc173cbb26676bec63e9b2d8c3335bf62b41511e273a211ba44
                                    • Instruction Fuzzy Hash: F801C4724007009FEB209F95D944B62FFE1EF08320F08C9AADE4A4B615D376E454DF62
                                    APIs
                                    • OleGetClipboard.OLE32(?,00000E24,?,?), ref: 0068A77E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1703812694.000000000068A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0068A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_68a000_L363rVr7oL.jbxd
                                    Similarity
                                    • API ID: Clipboard
                                    • String ID:
                                    • API String ID: 220874293-0
                                    • Opcode ID: 057d7df2e266ef2db735901c92790fa1d6e30ae8a5acc89ead4ccc6ae5348a4b
                                    • Instruction ID: 5c9d4f08af770a9d8e4017b3a793d2a2a0b443cc7483d57baa07dc52dd5636cf
                                    • Opcode Fuzzy Hash: 057d7df2e266ef2db735901c92790fa1d6e30ae8a5acc89ead4ccc6ae5348a4b
                                    • Instruction Fuzzy Hash: CD01A271500200ABD250DF1ACD46B66FBE8FB88A20F148159EC089BB41E771F915CBE6
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1703812694.000000000068A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0068A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_68a000_L363rVr7oL.jbxd
                                    Similarity
                                    • API ID: Initialize
                                    • String ID:
                                    • API String ID: 2538663250-0
                                    • Opcode ID: c27cce58ccfa241e2c05240093402727efbb64a91cb839f238348930efb07b1a
                                    • Instruction ID: d3e3950b4f80cfc5a81f8650f471a7b0bbf460c4c59eb58968521ea09ecd34ae
                                    • Opcode Fuzzy Hash: c27cce58ccfa241e2c05240093402727efbb64a91cb839f238348930efb07b1a
                                    • Instruction Fuzzy Hash: 3C01A2719042408FEB10DF55D984765FBE4DF04320F18C4ABDD498F756E279A884CFA2
                                    APIs
                                    • SetErrorMode.KERNELBASE(?), ref: 0068AA44
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1703812694.000000000068A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0068A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_68a000_L363rVr7oL.jbxd
                                    Similarity
                                    • API ID: ErrorMode
                                    • String ID:
                                    • API String ID: 2340568224-0
                                    • Opcode ID: 8553350ac981313827dc621ea9770e80bc56b871c50b2a5ebaa289fe69ba8371
                                    • Instruction ID: 6c800b1cb99b402290ba868368f4292ce82cef24ea36addddc0724b3c0c8e774
                                    • Opcode Fuzzy Hash: 8553350ac981313827dc621ea9770e80bc56b871c50b2a5ebaa289fe69ba8371
                                    • Instruction Fuzzy Hash: 46F0F4754002408FEB209F49D984761FBE0DF04320F08C0AADD490BB52D279E848CFA2
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1704558204.0000000004860000.00000040.00000800.00020000.00000000.sdmp, Offset: 04860000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4860000_L363rVr7oL.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 2k
                                    • API String ID: 0-1599061190
                                    • Opcode ID: 6ec37da762dd99bb5fadca632fdd2109c7daaf3c8647418ab1d7d3c16906c20c
                                    • Instruction ID: 93eebd058c4d6dccf986d67dedb0a0a0854e41b5cb13f399548dfee308eca675
                                    • Opcode Fuzzy Hash: 6ec37da762dd99bb5fadca632fdd2109c7daaf3c8647418ab1d7d3c16906c20c
                                    • Instruction Fuzzy Hash: 92817A30A00218CFDB24EFB4C855BECB7B2AF45308F1045AAD40AAB398DB799D85CF51
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1704558204.0000000004860000.00000040.00000800.00020000.00000000.sdmp, Offset: 04860000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4860000_L363rVr7oL.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 2k
                                    • API String ID: 0-1599061190
                                    • Opcode ID: 109347aaf1eb914e8be0c3f28f470eef4f44e250277d679059eb864cd65480d5
                                    • Instruction ID: fe3d0c68970138e95223166d5f0b43b551a8c0bef0c04c9a2041b7ce97b37959
                                    • Opcode Fuzzy Hash: 109347aaf1eb914e8be0c3f28f470eef4f44e250277d679059eb864cd65480d5
                                    • Instruction Fuzzy Hash: 35417A30A002188FDB24EFB4C955BECB7F2AF45308F1045AAD40AAB695DB795E85CF51
                                    APIs
                                    • CloseHandle.KERNELBASE(?), ref: 0068ABF0
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1703812694.000000000068A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0068A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_68a000_L363rVr7oL.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: d3771cc569695555b04b6bad9648f41b1ad6b0044847a599002fc54219de4c28
                                    • Instruction ID: aaae23306e8e0aeb61295622685e245633fde60112adde07ab3a24444f5cfc9a
                                    • Opcode Fuzzy Hash: d3771cc569695555b04b6bad9648f41b1ad6b0044847a599002fc54219de4c28
                                    • Instruction Fuzzy Hash: 7A21C2B55097C09FD7128F25DC95692BFB8EF07320F0985DBDD858F2A3D2645908CB62
                                    APIs
                                    • CloseHandle.KERNELBASE(?), ref: 0068ABF0
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1703812694.000000000068A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0068A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_68a000_L363rVr7oL.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: 0248c16626d39dd19b33f24b098dc61ab16ffeb6205058fc6a462eabdc168251
                                    • Instruction ID: 04bd6973d58be66832ee401e0472ff9081f015808a2bb4bb0d98d11e501f248f
                                    • Opcode Fuzzy Hash: 0248c16626d39dd19b33f24b098dc61ab16ffeb6205058fc6a462eabdc168251
                                    • Instruction Fuzzy Hash: 6C01D4715042408FEB109F59D9847A5FBE4DF04320F08C4ABDD498F752D279E844CBA2
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1704558204.0000000004860000.00000040.00000800.00020000.00000000.sdmp, Offset: 04860000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4860000_L363rVr7oL.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c7cb9454d3bbf8dd304e7fb1eeb023ab6c7cebc4e0736415a3abbab4c507ffdf
                                    • Instruction ID: 9a0935c108bd19c0b3d8c1c97a4206c85500ba6dc4e6815799dea47605513dc8
                                    • Opcode Fuzzy Hash: c7cb9454d3bbf8dd304e7fb1eeb023ab6c7cebc4e0736415a3abbab4c507ffdf
                                    • Instruction Fuzzy Hash: C5312330B102114FCB11FB78D8127BE33A79B89208F10483A9406D77A9EF3DAC1687D2
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1704250084.0000000000C60000.00000040.00000020.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c60000_L363rVr7oL.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0394b69c8648c36022c934e1af521c75a4d8c57c9ec9a2c89454f84a04086784
                                    • Instruction ID: 5e2c270b454bc994f74320d970cb0e530b0fab794f8bd7e92b38ab5d12de36ae
                                    • Opcode Fuzzy Hash: 0394b69c8648c36022c934e1af521c75a4d8c57c9ec9a2c89454f84a04086784
                                    • Instruction Fuzzy Hash: 3901DBB540D3905FD7118F059C50862FFF8DF46230709C4AFEC498B712D229A809CBB2
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1704250084.0000000000C60000.00000040.00000020.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c60000_L363rVr7oL.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 1328ee52c5b8469b93f687e9ee13f59e7c24594cc643e08404d56ea985cf41ae
                                    • Instruction ID: fb5165ee3251105b79946469e5adf45bd74eca9ac76a80a67d018436e3df8fb1
                                    • Opcode Fuzzy Hash: 1328ee52c5b8469b93f687e9ee13f59e7c24594cc643e08404d56ea985cf41ae
                                    • Instruction Fuzzy Hash: FDE092B6A046404B9650CF0AFC41452F7D8EB88630708C47FDC0D8BB11E235B908CAA5
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1704558204.0000000004860000.00000040.00000800.00020000.00000000.sdmp, Offset: 04860000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4860000_L363rVr7oL.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9b32e1cd9913cd3fd7515604c780e8e68b5a9e079969f01600c7b795c604016d
                                    • Instruction ID: 12fe27f68caf674ed110a22fc1272722347aec96700ac043f01684115e73d55d
                                    • Opcode Fuzzy Hash: 9b32e1cd9913cd3fd7515604c780e8e68b5a9e079969f01600c7b795c604016d
                                    • Instruction Fuzzy Hash: 29E017752663518FCB1A1B38A2666583B35EF4734D35108EFC8858B2A7DB3A9543C711
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1703798143.0000000000682000.00000040.00000800.00020000.00000000.sdmp, Offset: 00682000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_682000_L363rVr7oL.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f32430a343d6694f8315c6cdc552bb29fc9420dd6cbaeebeb4118150702235d7
                                    • Instruction ID: ff24bcd7f67d9c612140de8a36632094a6a8778ce4994c88950a1e02e6365a51
                                    • Opcode Fuzzy Hash: f32430a343d6694f8315c6cdc552bb29fc9420dd6cbaeebeb4118150702235d7
                                    • Instruction Fuzzy Hash: 1ED02E392006C24FD322AA0CC2A4FC537D4AB40708F4A04FAA800CB763C7A8D8D0C210
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1703798143.0000000000682000.00000040.00000800.00020000.00000000.sdmp, Offset: 00682000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_682000_L363rVr7oL.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 93c03fda84d262e496480ff131b068c35d8503e374f8271c66acec0143e26634
                                    • Instruction ID: 0e5b353075b29eed52ce40461d9ba359ab81deab155b1a89124b1a85617ece64
                                    • Opcode Fuzzy Hash: 93c03fda84d262e496480ff131b068c35d8503e374f8271c66acec0143e26634
                                    • Instruction Fuzzy Hash: A4D05E342002824FC726EA0CC2F4F9937D5AF40714F0645E8BC108B762C7A8DDC0DA00
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1704558204.0000000004860000.00000040.00000800.00020000.00000000.sdmp, Offset: 04860000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4860000_L363rVr7oL.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $\Ok$|ti$2k
                                    • API String ID: 0-897444909
                                    • Opcode ID: 4efd153f6933678f6e5f75861521f0e3a770b6f89d27f74635e78b9c1f5ec92b
                                    • Instruction ID: e6103bd724d8c2db7422369db53c4490e93689f301e452ea0e0a092b57131b7b
                                    • Opcode Fuzzy Hash: 4efd153f6933678f6e5f75861521f0e3a770b6f89d27f74635e78b9c1f5ec92b
                                    • Instruction Fuzzy Hash: 32036E74A11228CFDB25EF34D964BA9B7B2FB49304F1051EAD909A7399DB395E80CF40
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1704558204.0000000004860000.00000040.00000800.00020000.00000000.sdmp, Offset: 04860000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4860000_L363rVr7oL.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $\Ok$|ti$2k
                                    • API String ID: 0-897444909
                                    • Opcode ID: b759a13056fa4c714f5c847c2b9a7bd0f429754508013acc02de3b85027c439f
                                    • Instruction ID: e1b2bd9798c4f1d7abb3a7532ca14f2654bccb11d656013aee429d63f1633715
                                    • Opcode Fuzzy Hash: b759a13056fa4c714f5c847c2b9a7bd0f429754508013acc02de3b85027c439f
                                    • Instruction Fuzzy Hash: CC036D74A11228CFDB25EF34D964BA9B7B2FB49304F1051EAD909A7399DB395E80CF40
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1704558204.0000000004860000.00000040.00000800.00020000.00000000.sdmp, Offset: 04860000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4860000_L363rVr7oL.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $\Ok$|ti$2k
                                    • API String ID: 0-897444909
                                    • Opcode ID: 98f85f3d9ad6f809fecd418d4728a9ac252f2e202497d1b46f16ae17c11e094a
                                    • Instruction ID: f07f42ff81890414abb12222a41c24ea0ea171b0ef3ac1065984e07065e26d73
                                    • Opcode Fuzzy Hash: 98f85f3d9ad6f809fecd418d4728a9ac252f2e202497d1b46f16ae17c11e094a
                                    • Instruction Fuzzy Hash: 8C036E74A11228CFDB25EF34D964BA9B7B2FB49304F1051EAD909A7399DB395E80CF40
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1704558204.0000000004860000.00000040.00000800.00020000.00000000.sdmp, Offset: 04860000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4860000_L363rVr7oL.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $\Ok$|ti$2k
                                    • API String ID: 0-897444909
                                    • Opcode ID: b6601cbf44ce793c405a846388ce0033f29965c94cfd3ed8dc05892d6467b42c
                                    • Instruction ID: 8dd063dc111a2b101fd5600454b3a760fca3225164241062d21d20d876c2904c
                                    • Opcode Fuzzy Hash: b6601cbf44ce793c405a846388ce0033f29965c94cfd3ed8dc05892d6467b42c
                                    • Instruction Fuzzy Hash: B1F26E74A11228CFDB25EF34D964BA9B7B2FB49304F1051EAD909A7399DB395E80CF40
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1704558204.0000000004860000.00000040.00000800.00020000.00000000.sdmp, Offset: 04860000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4860000_L363rVr7oL.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $\Ok$|ti$2k
                                    • API String ID: 0-897444909
                                    • Opcode ID: b5b737ebe864d508514b850d9b39e64fd7abd5d978b7f7afc019f995e2a8c0f0
                                    • Instruction ID: d621739b66454efa9c6685510c29f7a0024c938df2662a306684660fd380cfe1
                                    • Opcode Fuzzy Hash: b5b737ebe864d508514b850d9b39e64fd7abd5d978b7f7afc019f995e2a8c0f0
                                    • Instruction Fuzzy Hash: A0F26E74A11128CFDB25EF34D964BA9B7B2FB49304F1051EAD909A73A9DB395E80CF40
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1704558204.0000000004860000.00000040.00000800.00020000.00000000.sdmp, Offset: 04860000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4860000_L363rVr7oL.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $\Ok$|ti$2k
                                    • API String ID: 0-897444909
                                    • Opcode ID: 0837d4bfd0e70cdd3f63bbb5efd51aaddcc061e8483c415961c76b729fa0c478
                                    • Instruction ID: 3756746b5d21bc731efab92b1885bdde6a9814e6e5872e5ebc26af8d27f024cb
                                    • Opcode Fuzzy Hash: 0837d4bfd0e70cdd3f63bbb5efd51aaddcc061e8483c415961c76b729fa0c478
                                    • Instruction Fuzzy Hash: 49F27E74A11228CFDB25EF34D864BA9B7B2FB49304F1051EAD949A7399DB395E80CF40
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1704558204.0000000004860000.00000040.00000800.00020000.00000000.sdmp, Offset: 04860000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4860000_L363rVr7oL.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $\Ok$|ti$2k
                                    • API String ID: 0-897444909
                                    • Opcode ID: 5439633310c2e2640328fa9da45c7bdbcd19e7b4197a93bcb49c9c932cc66b1e
                                    • Instruction ID: 5ba50517adfe020eeb060f5f6a19f9af549f226481f882b963c061adef847fb8
                                    • Opcode Fuzzy Hash: 5439633310c2e2640328fa9da45c7bdbcd19e7b4197a93bcb49c9c932cc66b1e
                                    • Instruction Fuzzy Hash: 4EF27E74A11228CFDB25EF34D864BA9B7B2FB49304F1051EAD949A7399DB395E80CF40
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1704558204.0000000004860000.00000040.00000800.00020000.00000000.sdmp, Offset: 04860000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4860000_L363rVr7oL.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $\Ok$|ti$2k
                                    • API String ID: 0-897444909
                                    • Opcode ID: 28b0b01948d4cc9bb23cd76bbfaa318c09dc75a4e5e875fbc0abacc589d86682
                                    • Instruction ID: a18705740bf2ac342a5baacd0f3b649d95f4f85a1505199479743eb07ce38895
                                    • Opcode Fuzzy Hash: 28b0b01948d4cc9bb23cd76bbfaa318c09dc75a4e5e875fbc0abacc589d86682
                                    • Instruction Fuzzy Hash: 3FF26E74A11228CFDB25EF34D864BA9B7B2FB49304F1051EAD949A7399DB395E80CF40
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1704558204.0000000004860000.00000040.00000800.00020000.00000000.sdmp, Offset: 04860000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4860000_L363rVr7oL.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $\Ok$|ti$2k
                                    • API String ID: 0-897444909
                                    • Opcode ID: 237a15c6e1d3fa6678daed72f4662f24cd6e8907c9d14d032a8ff58fab397267
                                    • Instruction ID: 48370f26185193075e8a1dfa0a8fe854015c38687f46b1ba983ae012fa22098a
                                    • Opcode Fuzzy Hash: 237a15c6e1d3fa6678daed72f4662f24cd6e8907c9d14d032a8ff58fab397267
                                    • Instruction Fuzzy Hash: 1FE27E74A11228CFDB25EF34D964BA9B7B2FB49304F1041EAD949A7399DB395E80CF40
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1704558204.0000000004860000.00000040.00000800.00020000.00000000.sdmp, Offset: 04860000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4860000_L363rVr7oL.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \Ok$|ti$2k
                                    • API String ID: 0-1839758915
                                    • Opcode ID: a3c75a377edef1dd8005ab77b6792f0f798a6a58491dffe45c3c5ac07e3920cf
                                    • Instruction ID: 3c695c748c6e957a9a4a1ab9c01fe39b2a546dd3c08fa72a66477c23f9a85c7b
                                    • Opcode Fuzzy Hash: a3c75a377edef1dd8005ab77b6792f0f798a6a58491dffe45c3c5ac07e3920cf
                                    • Instruction Fuzzy Hash: ADE27E74A11228CFDB25EF34D864BA9B7B2FB49304F1051EAD949A7399DB395E80CF40
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1704558204.0000000004860000.00000040.00000800.00020000.00000000.sdmp, Offset: 04860000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4860000_L363rVr7oL.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \Ok$|ti$2k
                                    • API String ID: 0-1839758915
                                    • Opcode ID: a03b18db635c69651f431ce0a6f0187cb34b1054bcd789fe3011c6f887df4756
                                    • Instruction ID: d970448d36d97aa0bff7afcb73afc1f8dd36f104e030c75ced6b30d0a657abc8
                                    • Opcode Fuzzy Hash: a03b18db635c69651f431ce0a6f0187cb34b1054bcd789fe3011c6f887df4756
                                    • Instruction Fuzzy Hash: 5BD25074A11228CFDB25EF34D964BA9B7B2FB49304F1051EAD849A7399DB355E80CF40
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1704558204.0000000004860000.00000040.00000800.00020000.00000000.sdmp, Offset: 04860000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4860000_L363rVr7oL.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \Ok$|ti$2k
                                    • API String ID: 0-1839758915
                                    • Opcode ID: affa1ad3478671d814d094976ad21ee2628678c92a0415896c6e86d7ae892e16
                                    • Instruction ID: 3f6b825640ff5c5c643f07b1f9433fdaefd6c6452c90dcd502ad85b73429b59b
                                    • Opcode Fuzzy Hash: affa1ad3478671d814d094976ad21ee2628678c92a0415896c6e86d7ae892e16
                                    • Instruction Fuzzy Hash: D0D25074A11228CFDB25EF34D964BA9B7B2FB49304F1051EAD849A73A9DB355E80CF40
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1704558204.0000000004860000.00000040.00000800.00020000.00000000.sdmp, Offset: 04860000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4860000_L363rVr7oL.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \Ok$|ti$2k
                                    • API String ID: 0-1839758915
                                    • Opcode ID: de765056d052f9803039ee45534361bb55dac0c0a6ad614b687ee8424cc03186
                                    • Instruction ID: 961bac83234effbfdb572b41fbfc9bdce149893112592c1fe99c35483f814a4d
                                    • Opcode Fuzzy Hash: de765056d052f9803039ee45534361bb55dac0c0a6ad614b687ee8424cc03186
                                    • Instruction Fuzzy Hash: 69D25F74A11228CFDB25EF34D964BA9B7B2FB49304F1051EAD849A73A9DB355E80CF40
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1704558204.0000000004860000.00000040.00000800.00020000.00000000.sdmp, Offset: 04860000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4860000_L363rVr7oL.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \Ok$|ti$2k
                                    • API String ID: 0-1839758915
                                    • Opcode ID: 004e575a7503275c24a55bb9274b661ff64b0601413478d129a3c7f70894faf2
                                    • Instruction ID: a8f2dc1ef3054d72851e28a4cb26df9a2988ec63bf321516cea2d2d3b7e10aef
                                    • Opcode Fuzzy Hash: 004e575a7503275c24a55bb9274b661ff64b0601413478d129a3c7f70894faf2
                                    • Instruction Fuzzy Hash: 4ED25F74A11228CFDB25EF34D964BA9B7B2FB49304F1051EAD849A73A9DB355E80CF40
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1704558204.0000000004860000.00000040.00000800.00020000.00000000.sdmp, Offset: 04860000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4860000_L363rVr7oL.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \Ok$|ti$2k
                                    • API String ID: 0-1839758915
                                    • Opcode ID: 490fe9256d4630fb439083d09138d629e67ca96c60eed0cc1159230130a3bbd4
                                    • Instruction ID: b204f183d9dac344438df8929f3fc9947e19a7674ca6b3e2609838a55b9703c5
                                    • Opcode Fuzzy Hash: 490fe9256d4630fb439083d09138d629e67ca96c60eed0cc1159230130a3bbd4
                                    • Instruction Fuzzy Hash: ADD25F74A11228CFDB25EF34D964BA9B7B2FB49304F1051EAD849A73A9DB355E80CF40
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1704558204.0000000004860000.00000040.00000800.00020000.00000000.sdmp, Offset: 04860000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4860000_L363rVr7oL.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \Ok$|ti$2k
                                    • API String ID: 0-1839758915
                                    • Opcode ID: baf483951a7ac325a48d32cc68a0cca1af1ca073d975b544ff20117005d9e5c4
                                    • Instruction ID: 7679429d4b154878ef3936e3df5467cda61f61efa0bdd1b0cda3394682658775
                                    • Opcode Fuzzy Hash: baf483951a7ac325a48d32cc68a0cca1af1ca073d975b544ff20117005d9e5c4
                                    • Instruction Fuzzy Hash: 9AC25C74A11228CFDB25EF30D864BA9B7B6FB49304F1051EAD909A7399DB359E81CF40
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1704558204.0000000004860000.00000040.00000800.00020000.00000000.sdmp, Offset: 04860000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4860000_L363rVr7oL.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \Ok
                                    • API String ID: 0-3677890257
                                    • Opcode ID: a6b6bd66668f353305df12b06f9a6ba58fdd7ddd916ab18c349fbd239c8c4a5a
                                    • Instruction ID: 06c7845bfd52d91c18638ec99044ccc184e70373f36403b0a43d3e5be161508c
                                    • Opcode Fuzzy Hash: a6b6bd66668f353305df12b06f9a6ba58fdd7ddd916ab18c349fbd239c8c4a5a
                                    • Instruction Fuzzy Hash: 48C25D74A11228CFDB25EF30D864BA9B7B6FB49304F1051EAD909A7399DB359E81CF40
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1704558204.0000000004860000.00000040.00000800.00020000.00000000.sdmp, Offset: 04860000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4860000_L363rVr7oL.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: Ni$Ni$Ni$Ni
                                    • API String ID: 0-3444230515
                                    • Opcode ID: bdb8e23f767431c327899e0907f0cfa42c83f54d941bf60ea7d1482e3bbaa1af
                                    • Instruction ID: 7e2b459aba52ffb23476246f109365755d2959beb9406bfd08739bbae3a808da
                                    • Opcode Fuzzy Hash: bdb8e23f767431c327899e0907f0cfa42c83f54d941bf60ea7d1482e3bbaa1af
                                    • Instruction Fuzzy Hash: DD213E757002199FEB20DE6DC880BAA73EAFF89204F140968E906EB744EB70F9058790

                                    Execution Graph

                                    Execution Coverage:35.3%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:6.7%
                                    Total number of Nodes:105
                                    Total number of Limit Nodes:6
                                    execution_graph 20500 5fa65e 20501 5fa68a CloseHandle 20500->20501 20502 5fa6c0 20500->20502 20503 5fa698 20501->20503 20502->20501 20575 5fb69e 20576 5fb6cd WaitForInputIdle 20575->20576 20577 5fb703 20575->20577 20578 5fb6db 20576->20578 20577->20576 20504 4873082 20506 48730b7 SetProcessWorkingSetSize 20504->20506 20507 48730e3 20506->20507 20508 5fb45a 20510 5fb495 SendMessageTimeoutA 20508->20510 20511 5fb4dd 20510->20511 20579 5fa59a 20580 5fa5d8 DuplicateHandle 20579->20580 20581 5fa610 20579->20581 20582 5fa5e6 20580->20582 20581->20580 20583 487204e 20584 4872083 WSAConnect 20583->20584 20586 48720a2 20584->20586 20512 4871a0a 20514 4871a42 MapViewOfFile 20512->20514 20515 4871a91 20514->20515 20587 5faa12 20588 5faa3e SetErrorMode 20587->20588 20589 5faa67 20587->20589 20590 5faa53 20588->20590 20589->20588 20591 4870eca 20593 4870eff GetExitCodeProcess 20591->20593 20594 4870f28 20593->20594 20595 4872eca 20596 4872ef3 select 20595->20596 20598 4872f28 20596->20598 20516 5fbc4e 20517 5fbc7d AdjustTokenPrivileges 20516->20517 20519 5fbc9f 20517->20519 20520 5fbace 20521 5fbaf7 LookupPrivilegeValueW 20520->20521 20523 5fbb1e 20521->20523 20524 5fb8ce 20525 5fb8f4 DeleteFileW 20524->20525 20527 5fb910 20525->20527 20531 5fbdca 20532 5fbdff NtQuerySystemInformation 20531->20532 20533 5fbe2a 20531->20533 20534 5fbe14 20532->20534 20533->20532 20535 4872f9e 20538 4872fd3 GetProcessWorkingSetSize 20535->20538 20537 4872fff 20538->20537 20539 5fb746 20540 5fb76f CopyFileW 20539->20540 20542 5fb796 20540->20542 20543 4872c1e 20544 4872c56 RegCreateKeyExW 20543->20544 20546 4872cc8 20544->20546 20599 5fa186 20600 5fa1bb send 20599->20600 20601 5fa1f3 20599->20601 20602 5fa1c9 20600->20602 20601->20600 20603 487185a 20605 4871892 ConvertStringSecurityDescriptorToSecurityDescriptorW 20603->20605 20606 48718d3 20605->20606 20607 5fb982 20608 5fb9ab SetFileAttributesW 20607->20608 20610 5fb9c7 20608->20610 20547 5fb27e 20548 5fb2b3 RegQueryValueExW 20547->20548 20550 5fb307 20548->20550 20611 5fbf3e 20612 5fbf6a K32EnumProcesses 20611->20612 20614 5fbf86 20612->20614 20551 5fb176 20552 5fb1ae RegOpenKeyExW 20551->20552 20554 5fb204 20552->20554 20555 487142e 20557 4871466 WSASocketW 20555->20557 20558 48714a2 20557->20558 20619 4872dee 20621 4872e23 ioctlsocket 20619->20621 20622 4872e4f 20621->20622 20559 5fb372 20560 5fb3a7 RegSetValueExW 20559->20560 20562 5fb3f3 20560->20562 20563 5fadee 20565 5fae23 ReadFile 20563->20565 20566 5fae55 20565->20566 20627 5fa72e 20628 5fa77e OleGetClipboard 20627->20628 20629 5fa78c 20628->20629 20567 5fac6a 20570 5fac9f GetFileType 20567->20570 20569 5faccc 20570->20569 20630 5fafaa 20631 5fafe2 CreateMutexW 20630->20631 20633 5fb025 20631->20633 20634 4871e7e 20635 4871eb3 GetProcessTimes 20634->20635 20637 4871ee5 20635->20637 20638 5faaa6 20639 5faade CreateFileW 20638->20639 20641 5fab2d 20639->20641 20642 48722fa 20644 4872335 LoadLibraryA 20642->20644 20645 4872372 20644->20645
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142647125.0000000004800000.00000040.00000800.00020000.00000000.sdmp, Offset: 04800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4800000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: @$\Ok$|t`$2k
                                    • API String ID: 0-2856431566
                                    • Opcode ID: 29e5752d04f03fdb379c640ba17f45706aaff9547e99927bef49268561710b3f
                                    • Instruction ID: d0894e70a2e7f2f394a617f1c6840054584524d0ebce16e6292e0acaad27f0d9
                                    • Opcode Fuzzy Hash: 29e5752d04f03fdb379c640ba17f45706aaff9547e99927bef49268561710b3f
                                    • Instruction Fuzzy Hash: 78233B74A012288FDB29EF34DD54BADB7B2BB48304F1041E9D509AB3A4DB395E85DF90
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142647125.0000000004800000.00000040.00000800.00020000.00000000.sdmp, Offset: 04800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4800000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $\Ok$|t`$2k
                                    • API String ID: 0-3379087335
                                    • Opcode ID: 990e06b6edc0ea1255811377b4c7dac40de1d6610a9c01138567a582b0771d95
                                    • Instruction ID: dd4ae0cc2cd6022c2f3fc4c44b08d0802281578b0ac68223e4f7d55503f2c3fb
                                    • Opcode Fuzzy Hash: 990e06b6edc0ea1255811377b4c7dac40de1d6610a9c01138567a582b0771d95
                                    • Instruction Fuzzy Hash: 75133A74A01228CFDB29EF34DC54BA9B7B6BB48304F1041E9D909AB3A4DB355E85DF90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1122 48044e9-4804675 1143 4804805-4804819 1122->1143 1144 480467b-48047ca 1122->1144 1145 4804967-480497b 1143->1145 1146 480481f-4804924 1143->1146 1144->1143 1148 480497d-4804983 call 4804208 1145->1148 1149 48049ce-48049e2 1145->1149 1346 480492c 1146->1346 1154 4804988-4804993 1148->1154 1151 48049e4-48049ef 1149->1151 1152 4804a2a-4804a3e 1149->1152 1151->1152 1155 4804a44-4804b49 1152->1155 1156 4804b8c-4804ba0 1152->1156 1154->1149 1372 4804b51 1155->1372 1159 4804ba6-4804bba 1156->1159 1160 4804ccc-4804ce0 1156->1160 1163 4804bc8-4804bdc 1159->1163 1164 4804bbc-4804bc3 1159->1164 1165 4804ce6-4804f1a 1160->1165 1166 4804f6c-4804f80 1160->1166 1173 4804be7-4804bfb 1163->1173 1174 4804bde-4804be5 1163->1174 1170 4804c40-4804c54 1164->1170 1639 4804f25 1165->1639 1171 4804f82-4804f89 1166->1171 1172 4804fda-4804fee 1166->1172 1177 4804c56-4804c6c 1170->1177 1178 4804c6e-4804c7a 1170->1178 1202 4804f93 1171->1202 1181 4804ff0-4804ff6 1172->1181 1182 480503d-4805051 1172->1182 1175 4804c06-4804c1a 1173->1175 1176 4804bfd-4804c04 1173->1176 1174->1170 1186 4804c25-4804c39 1175->1186 1187 4804c1c-4804c23 1175->1187 1176->1170 1188 4804c85 1177->1188 1178->1188 1181->1182 1184 4805053 1182->1184 1185 480509a-48050ae 1182->1185 1184->1185 1191 48050b0-48050d9 1185->1191 1192 4805125-4805139 1185->1192 1186->1170 1196 4804c3b-4804c3d 1186->1196 1187->1170 1188->1160 1191->1192 1199 48053ac-48053c0 1192->1199 1200 480513f-480535b 1192->1200 1196->1170 1206 4805496-48054aa 1199->1206 1207 48053c6-48053d6 1199->1207 1583 480535d 1200->1583 1584 480535f 1200->1584 1202->1172 1210 48054b0-4805620 1206->1210 1211 4805667-480567b 1206->1211 1646 48053dc call 660606 1207->1646 1647 48053dc call 6605df 1207->1647 1210->1211 1215 4805681-480578c 1211->1215 1216 48057de-48057f2 1211->1216 1499 4805797 1215->1499 1222 4805955-4805969 1216->1222 1223 48057f8-4805903 1216->1223 1227 4805acc-4805ae0 1222->1227 1228 480596f-4805a7a 1222->1228 1518 480590e 1223->1518 1235 4805c43-4805c57 1227->1235 1236 4805ae6-4805bf1 1227->1236 1524 4805a85 1228->1524 1232 48053e2-4805448 1315 480544f 1232->1315 1240 4805dba-4805dce 1235->1240 1241 4805c5d-4805d68 1235->1241 1540 4805bfc 1236->1540 1253 4805f31-4805f45 1240->1253 1254 4805dd4-4805eea 1240->1254 1558 4805d73 1241->1558 1260 48060a8-48060bc 1253->1260 1261 4805f4b-4806061 1253->1261 1254->1253 1268 48060c2-48061cd 1260->1268 1269 480621f-4806233 1260->1269 1261->1260 1579 48061d8 1268->1579 1276 4806396-48063aa 1269->1276 1277 4806239-4806344 1269->1277 1285 48063b0-48063f5 call 4804270 1276->1285 1286 480652e-4806542 1276->1286 1590 480634f 1277->1590 1421 48064b5-48064d7 1285->1421 1299 4806685-4806699 1286->1299 1300 4806548-4806567 1286->1300 1303 48067e6-48067fa 1299->1303 1304 480669f-480679f 1299->1304 1325 480660c-480662e 1300->1325 1322 4806800-4806900 1303->1322 1323 4806947-480695b 1303->1323 1304->1303 1315->1206 1322->1323 1330 4806961-4806a61 1323->1330 1331 4806aa8-4806ad2 1323->1331 1338 4806634 1325->1338 1339 480656c-480657b 1325->1339 1330->1331 1350 4806b92-4806ba6 1331->1350 1351 4806ad8-4806b4b 1331->1351 1338->1299 1356 4806581-4806585 1339->1356 1357 4806636 1339->1357 1346->1145 1365 4806c83-4806c97 1350->1365 1366 4806bac-4806c3c 1350->1366 1351->1350 1382 4806590-48065b4 1356->1382 1378 480663b-4806683 1357->1378 1373 4806ddd-4806df1 1365->1373 1374 4806c9d-4806d8f 1365->1374 1366->1365 1372->1156 1386 4807054-4807068 1373->1386 1387 4806df7-4806e47 1373->1387 1619 4806d96 1374->1619 1378->1299 1448 48065b6-48065f0 1382->1448 1449 48065fb-4806604 1382->1449 1407 4807150-4807157 1386->1407 1408 480706e-4807109 call 4804270 * 2 1386->1408 1500 4806eb5-4806ee0 1387->1500 1501 4806e49-4806e6f 1387->1501 1408->1407 1435 48063fa-4806409 1421->1435 1436 48064dd 1421->1436 1446 48064df 1435->1446 1447 480640f-48064ad 1435->1447 1436->1286 1470 48064e4-480652c 1446->1470 1447->1470 1586 48064af 1447->1586 1448->1449 1449->1378 1451 4806606 1449->1451 1451->1325 1470->1286 1499->1216 1580 4806ee6-4806fb9 1500->1580 1581 4806fbe-480704f 1500->1581 1577 4806eb0 1501->1577 1578 4806e71-4806e91 1501->1578 1518->1222 1524->1227 1540->1235 1558->1240 1577->1386 1578->1577 1579->1269 1580->1386 1581->1386 1587 4805365 1583->1587 1584->1587 1648 480535f call 4807340 1584->1648 1586->1421 1587->1199 1590->1276 1619->1373 1639->1166 1646->1232 1647->1232 1648->1587
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142647125.0000000004800000.00000040.00000800.00020000.00000000.sdmp, Offset: 04800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4800000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $\Ok$|t`$2k
                                    • API String ID: 0-3379087335
                                    • Opcode ID: 40ce6298261b57b80310d25fb4c98f4053d4874933eff7f9e69564d04da9fc9d
                                    • Instruction ID: 906ede1db51b47090e2a70139f05b6427e367694b482291ade890ba9c4a8a24a
                                    • Opcode Fuzzy Hash: 40ce6298261b57b80310d25fb4c98f4053d4874933eff7f9e69564d04da9fc9d
                                    • Instruction Fuzzy Hash: 57033B74A012288FDB29EF34DC54BA9B7B6FB48304F1041E9D909AB3A4DB355E85DF90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2173 4804628-4804675 2180 4804805-4804819 2173->2180 2181 480467b-48047ca 2173->2181 2182 4804967-480497b 2180->2182 2183 480481f-4804924 2180->2183 2181->2180 2185 480497d-4804983 call 4804208 2182->2185 2186 48049ce-48049e2 2182->2186 2383 480492c 2183->2383 2191 4804988-4804993 2185->2191 2188 48049e4-48049ef 2186->2188 2189 4804a2a-4804a3e 2186->2189 2188->2189 2192 4804a44-4804b49 2189->2192 2193 4804b8c-4804ba0 2189->2193 2191->2186 2409 4804b51 2192->2409 2196 4804ba6-4804bba 2193->2196 2197 4804ccc-4804ce0 2193->2197 2200 4804bc8-4804bdc 2196->2200 2201 4804bbc-4804bc3 2196->2201 2202 4804ce6-4804f1a 2197->2202 2203 4804f6c-4804f80 2197->2203 2210 4804be7-4804bfb 2200->2210 2211 4804bde-4804be5 2200->2211 2207 4804c40-4804c54 2201->2207 2676 4804f25 2202->2676 2208 4804f82-4804f89 2203->2208 2209 4804fda-4804fee 2203->2209 2214 4804c56-4804c6c 2207->2214 2215 4804c6e-4804c7a 2207->2215 2239 4804f93 2208->2239 2218 4804ff0-4804ff6 2209->2218 2219 480503d-4805051 2209->2219 2212 4804c06-4804c1a 2210->2212 2213 4804bfd-4804c04 2210->2213 2211->2207 2223 4804c25-4804c39 2212->2223 2224 4804c1c-4804c23 2212->2224 2213->2207 2225 4804c85 2214->2225 2215->2225 2218->2219 2221 4805053 2219->2221 2222 480509a-48050ae 2219->2222 2221->2222 2228 48050b0-48050d9 2222->2228 2229 4805125-4805139 2222->2229 2223->2207 2233 4804c3b-4804c3d 2223->2233 2224->2207 2225->2197 2228->2229 2236 48053ac-48053c0 2229->2236 2237 480513f-480535b 2229->2237 2233->2207 2243 4805496-48054aa 2236->2243 2244 48053c6-48053d6 2236->2244 2620 480535d 2237->2620 2621 480535f 2237->2621 2239->2209 2247 48054b0-4805620 2243->2247 2248 4805667-480567b 2243->2248 2683 48053dc call 660606 2244->2683 2684 48053dc call 6605df 2244->2684 2247->2248 2252 4805681-480578c 2248->2252 2253 48057de-48057f2 2248->2253 2536 4805797 2252->2536 2259 4805955-4805969 2253->2259 2260 48057f8-4805903 2253->2260 2264 4805acc-4805ae0 2259->2264 2265 480596f-4805a7a 2259->2265 2555 480590e 2260->2555 2272 4805c43-4805c57 2264->2272 2273 4805ae6-4805bf1 2264->2273 2561 4805a85 2265->2561 2269 48053e2-4805448 2352 480544f 2269->2352 2277 4805dba-4805dce 2272->2277 2278 4805c5d-4805d68 2272->2278 2577 4805bfc 2273->2577 2290 4805f31-4805f45 2277->2290 2291 4805dd4-4805eea 2277->2291 2595 4805d73 2278->2595 2297 48060a8-48060bc 2290->2297 2298 4805f4b-4806061 2290->2298 2291->2290 2305 48060c2-48061cd 2297->2305 2306 480621f-4806233 2297->2306 2298->2297 2616 48061d8 2305->2616 2313 4806396-48063aa 2306->2313 2314 4806239-4806344 2306->2314 2322 48063b0-48063f5 call 4804270 2313->2322 2323 480652e-4806542 2313->2323 2627 480634f 2314->2627 2458 48064b5-48064d7 2322->2458 2336 4806685-4806699 2323->2336 2337 4806548-4806567 2323->2337 2340 48067e6-48067fa 2336->2340 2341 480669f-480679f 2336->2341 2362 480660c-480662e 2337->2362 2359 4806800-4806900 2340->2359 2360 4806947-480695b 2340->2360 2341->2340 2352->2243 2359->2360 2367 4806961-4806a61 2360->2367 2368 4806aa8-4806ad2 2360->2368 2375 4806634 2362->2375 2376 480656c-480657b 2362->2376 2367->2368 2387 4806b92-4806ba6 2368->2387 2388 4806ad8-4806b4b 2368->2388 2375->2336 2393 4806581-4806585 2376->2393 2394 4806636 2376->2394 2383->2182 2402 4806c83-4806c97 2387->2402 2403 4806bac-4806c3c 2387->2403 2388->2387 2419 4806590-48065b4 2393->2419 2415 480663b-4806683 2394->2415 2410 4806ddd-4806df1 2402->2410 2411 4806c9d-4806d8f 2402->2411 2403->2402 2409->2193 2423 4807054-4807068 2410->2423 2424 4806df7-4806e47 2410->2424 2656 4806d96 2411->2656 2415->2336 2485 48065b6-48065f0 2419->2485 2486 48065fb-4806604 2419->2486 2444 4807150-4807157 2423->2444 2445 480706e-4807109 call 4804270 * 2 2423->2445 2537 4806eb5-4806ee0 2424->2537 2538 4806e49-4806e6f 2424->2538 2445->2444 2472 48063fa-4806409 2458->2472 2473 48064dd 2458->2473 2483 48064df 2472->2483 2484 480640f-48064ad 2472->2484 2473->2323 2507 48064e4-480652c 2483->2507 2484->2507 2623 48064af 2484->2623 2485->2486 2486->2415 2488 4806606 2486->2488 2488->2362 2507->2323 2536->2253 2617 4806ee6-4806fb9 2537->2617 2618 4806fbe-480704f 2537->2618 2614 4806eb0 2538->2614 2615 4806e71-4806e91 2538->2615 2555->2259 2561->2264 2577->2272 2595->2277 2614->2423 2615->2614 2616->2306 2617->2423 2618->2423 2624 4805365 2620->2624 2621->2624 2685 480535f call 4807340 2621->2685 2623->2458 2624->2236 2627->2313 2656->2410 2676->2203 2683->2269 2684->2269 2685->2624
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142647125.0000000004800000.00000040.00000800.00020000.00000000.sdmp, Offset: 04800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4800000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $\Ok$|t`$2k
                                    • API String ID: 0-3379087335
                                    • Opcode ID: b3bea73f0c7634071485193ee2d715cbf97d86249583a9a7d61a1a3b5f871e2b
                                    • Instruction ID: 9c63e157ff20b65fa13f372a8be5a401adc7c756466deefa5d12bfb99dd4c6b1
                                    • Opcode Fuzzy Hash: b3bea73f0c7634071485193ee2d715cbf97d86249583a9a7d61a1a3b5f871e2b
                                    • Instruction Fuzzy Hash: 8E033A74A012288FDB29EF34DC54BA9B7B6FB48304F1041E9D909AB3A4DB355E85DF90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2686 4804707-4804819 2700 4804967-480497b 2686->2700 2701 480481f-4804924 2686->2701 2702 480497d-4804983 call 4804208 2700->2702 2703 48049ce-48049e2 2700->2703 2888 480492c 2701->2888 2708 4804988-4804993 2702->2708 2705 48049e4-48049ef 2703->2705 2706 4804a2a-4804a3e 2703->2706 2705->2706 2709 4804a44-4804b49 2706->2709 2710 4804b8c-4804ba0 2706->2710 2708->2703 2914 4804b51 2709->2914 2712 4804ba6-4804bba 2710->2712 2713 4804ccc-4804ce0 2710->2713 2716 4804bc8-4804bdc 2712->2716 2717 4804bbc-4804bc3 2712->2717 2718 4804ce6-4804f1a 2713->2718 2719 4804f6c-4804f80 2713->2719 2725 4804be7-4804bfb 2716->2725 2726 4804bde-4804be5 2716->2726 2722 4804c40-4804c54 2717->2722 3181 4804f25 2718->3181 2723 4804f82-4804f89 2719->2723 2724 4804fda-4804fee 2719->2724 2729 4804c56-4804c6c 2722->2729 2730 4804c6e-4804c7a 2722->2730 2752 4804f93 2723->2752 2733 4804ff0-4804ff6 2724->2733 2734 480503d-4805051 2724->2734 2727 4804c06-4804c1a 2725->2727 2728 4804bfd-4804c04 2725->2728 2726->2722 2737 4804c25-4804c39 2727->2737 2738 4804c1c-4804c23 2727->2738 2728->2722 2739 4804c85 2729->2739 2730->2739 2733->2734 2735 4805053 2734->2735 2736 480509a-48050ae 2734->2736 2735->2736 2742 48050b0-48050d9 2736->2742 2743 4805125-4805139 2736->2743 2737->2722 2744 4804c3b-4804c3d 2737->2744 2738->2722 2739->2713 2742->2743 2749 48053ac-48053c0 2743->2749 2750 480513f-480535b 2743->2750 2744->2722 2754 4805496-48054aa 2749->2754 2755 48053c6-48053d6 2749->2755 3125 480535d 2750->3125 3126 480535f 2750->3126 2752->2724 2758 48054b0-4805620 2754->2758 2759 4805667-480567b 2754->2759 3188 48053dc call 660606 2755->3188 3189 48053dc call 6605df 2755->3189 2758->2759 2765 4805681-480578c 2759->2765 2766 48057de-48057f2 2759->2766 3041 4805797 2765->3041 2769 4805955-4805969 2766->2769 2770 48057f8-4805903 2766->2770 2775 4805acc-4805ae0 2769->2775 2776 480596f-4805a7a 2769->2776 3060 480590e 2770->3060 2782 4805c43-4805c57 2775->2782 2783 4805ae6-4805bf1 2775->2783 3066 4805a85 2776->3066 2777 48053e2-4805448 2857 480544f 2777->2857 2786 4805dba-4805dce 2782->2786 2787 4805c5d-4805d68 2782->2787 3082 4805bfc 2783->3082 2797 4805f31-4805f45 2786->2797 2798 4805dd4-4805eea 2786->2798 3100 4805d73 2787->3100 2805 48060a8-48060bc 2797->2805 2806 4805f4b-4806061 2797->2806 2798->2797 2813 48060c2-48061cd 2805->2813 2814 480621f-4806233 2805->2814 2806->2805 3121 48061d8 2813->3121 2820 4806396-48063aa 2814->2820 2821 4806239-4806344 2814->2821 2829 48063b0-48063f5 call 4804270 2820->2829 2830 480652e-4806542 2820->2830 3132 480634f 2821->3132 2963 48064b5-48064d7 2829->2963 2842 4806685-4806699 2830->2842 2843 4806548-4806567 2830->2843 2846 48067e6-48067fa 2842->2846 2847 480669f-480679f 2842->2847 2867 480660c-480662e 2843->2867 2864 4806800-4806900 2846->2864 2865 4806947-480695b 2846->2865 2847->2846 2857->2754 2864->2865 2872 4806961-4806a61 2865->2872 2873 4806aa8-4806ad2 2865->2873 2880 4806634 2867->2880 2881 480656c-480657b 2867->2881 2872->2873 2892 4806b92-4806ba6 2873->2892 2893 4806ad8-4806b4b 2873->2893 2880->2842 2898 4806581-4806585 2881->2898 2899 4806636 2881->2899 2888->2700 2907 4806c83-4806c97 2892->2907 2908 4806bac-4806c3c 2892->2908 2893->2892 2924 4806590-48065b4 2898->2924 2920 480663b-4806683 2899->2920 2915 4806ddd-4806df1 2907->2915 2916 4806c9d-4806d8f 2907->2916 2908->2907 2914->2710 2928 4807054-4807068 2915->2928 2929 4806df7-4806e47 2915->2929 3161 4806d96 2916->3161 2920->2842 2990 48065b6-48065f0 2924->2990 2991 48065fb-4806604 2924->2991 2949 4807150-4807157 2928->2949 2950 480706e-4807109 call 4804270 * 2 2928->2950 3042 4806eb5-4806ee0 2929->3042 3043 4806e49-4806e6f 2929->3043 2950->2949 2977 48063fa-4806409 2963->2977 2978 48064dd 2963->2978 2988 48064df 2977->2988 2989 480640f-48064ad 2977->2989 2978->2830 3012 48064e4-480652c 2988->3012 2989->3012 3128 48064af 2989->3128 2990->2991 2991->2920 2993 4806606 2991->2993 2993->2867 3012->2830 3041->2766 3122 4806ee6-4806fb9 3042->3122 3123 4806fbe-480704f 3042->3123 3119 4806eb0 3043->3119 3120 4806e71-4806e91 3043->3120 3060->2769 3066->2775 3082->2782 3100->2786 3119->2928 3120->3119 3121->2814 3122->2928 3123->2928 3129 4805365 3125->3129 3126->3129 3190 480535f call 4807340 3126->3190 3128->2963 3129->2749 3132->2820 3161->2915 3181->2719 3188->2777 3189->2777 3190->3129
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142647125.0000000004800000.00000040.00000800.00020000.00000000.sdmp, Offset: 04800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4800000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $\Ok$|t`$2k
                                    • API String ID: 0-3379087335
                                    • Opcode ID: 9497dc3e4f56e16ee51ec803156463f8a29bf72bb368f976110e8d53f1663f79
                                    • Instruction ID: d884bf748159f2c8e41c55eeed8e317a3da983bedb24ffe5751a9d2765202a25
                                    • Opcode Fuzzy Hash: 9497dc3e4f56e16ee51ec803156463f8a29bf72bb368f976110e8d53f1663f79
                                    • Instruction Fuzzy Hash: 72F23B74A012288FDB29EF34DC54BA9B7B6FB48304F1041E9D909AB3A4DB355E85DF90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 3191 48047cc-4804819 3198 4804967-480497b 3191->3198 3199 480481f-4804924 3191->3199 3200 480497d-4804983 call 4804208 3198->3200 3201 48049ce-48049e2 3198->3201 3386 480492c 3199->3386 3206 4804988-4804993 3200->3206 3203 48049e4-48049ef 3201->3203 3204 4804a2a-4804a3e 3201->3204 3203->3204 3207 4804a44-4804b49 3204->3207 3208 4804b8c-4804ba0 3204->3208 3206->3201 3412 4804b51 3207->3412 3210 4804ba6-4804bba 3208->3210 3211 4804ccc-4804ce0 3208->3211 3214 4804bc8-4804bdc 3210->3214 3215 4804bbc-4804bc3 3210->3215 3216 4804ce6-4804f1a 3211->3216 3217 4804f6c-4804f80 3211->3217 3223 4804be7-4804bfb 3214->3223 3224 4804bde-4804be5 3214->3224 3220 4804c40-4804c54 3215->3220 3679 4804f25 3216->3679 3221 4804f82-4804f89 3217->3221 3222 4804fda-4804fee 3217->3222 3227 4804c56-4804c6c 3220->3227 3228 4804c6e-4804c7a 3220->3228 3250 4804f93 3221->3250 3231 4804ff0-4804ff6 3222->3231 3232 480503d-4805051 3222->3232 3225 4804c06-4804c1a 3223->3225 3226 4804bfd-4804c04 3223->3226 3224->3220 3235 4804c25-4804c39 3225->3235 3236 4804c1c-4804c23 3225->3236 3226->3220 3237 4804c85 3227->3237 3228->3237 3231->3232 3233 4805053 3232->3233 3234 480509a-48050ae 3232->3234 3233->3234 3240 48050b0-48050d9 3234->3240 3241 4805125-4805139 3234->3241 3235->3220 3242 4804c3b-4804c3d 3235->3242 3236->3220 3237->3211 3240->3241 3247 48053ac-48053c0 3241->3247 3248 480513f-480535b 3241->3248 3242->3220 3252 4805496-48054aa 3247->3252 3253 48053c6-48053d6 3247->3253 3623 480535d 3248->3623 3624 480535f 3248->3624 3250->3222 3256 48054b0-4805620 3252->3256 3257 4805667-480567b 3252->3257 3686 48053dc call 660606 3253->3686 3687 48053dc call 6605df 3253->3687 3256->3257 3263 4805681-480578c 3257->3263 3264 48057de-48057f2 3257->3264 3539 4805797 3263->3539 3267 4805955-4805969 3264->3267 3268 48057f8-4805903 3264->3268 3273 4805acc-4805ae0 3267->3273 3274 480596f-4805a7a 3267->3274 3558 480590e 3268->3558 3280 4805c43-4805c57 3273->3280 3281 4805ae6-4805bf1 3273->3281 3564 4805a85 3274->3564 3275 48053e2-4805448 3355 480544f 3275->3355 3284 4805dba-4805dce 3280->3284 3285 4805c5d-4805d68 3280->3285 3580 4805bfc 3281->3580 3295 4805f31-4805f45 3284->3295 3296 4805dd4-4805eea 3284->3296 3598 4805d73 3285->3598 3303 48060a8-48060bc 3295->3303 3304 4805f4b-4806061 3295->3304 3296->3295 3311 48060c2-48061cd 3303->3311 3312 480621f-4806233 3303->3312 3304->3303 3619 48061d8 3311->3619 3318 4806396-48063aa 3312->3318 3319 4806239-4806344 3312->3319 3327 48063b0-48063f5 call 4804270 3318->3327 3328 480652e-4806542 3318->3328 3630 480634f 3319->3630 3461 48064b5-48064d7 3327->3461 3340 4806685-4806699 3328->3340 3341 4806548-4806567 3328->3341 3344 48067e6-48067fa 3340->3344 3345 480669f-480679f 3340->3345 3365 480660c-480662e 3341->3365 3362 4806800-4806900 3344->3362 3363 4806947-480695b 3344->3363 3345->3344 3355->3252 3362->3363 3370 4806961-4806a61 3363->3370 3371 4806aa8-4806ad2 3363->3371 3378 4806634 3365->3378 3379 480656c-480657b 3365->3379 3370->3371 3390 4806b92-4806ba6 3371->3390 3391 4806ad8-4806b4b 3371->3391 3378->3340 3396 4806581-4806585 3379->3396 3397 4806636 3379->3397 3386->3198 3405 4806c83-4806c97 3390->3405 3406 4806bac-4806c3c 3390->3406 3391->3390 3422 4806590-48065b4 3396->3422 3418 480663b-4806683 3397->3418 3413 4806ddd-4806df1 3405->3413 3414 4806c9d-4806d8f 3405->3414 3406->3405 3412->3208 3426 4807054-4807068 3413->3426 3427 4806df7-4806e47 3413->3427 3659 4806d96 3414->3659 3418->3340 3488 48065b6-48065f0 3422->3488 3489 48065fb-4806604 3422->3489 3447 4807150-4807157 3426->3447 3448 480706e-4807109 call 4804270 * 2 3426->3448 3540 4806eb5-4806ee0 3427->3540 3541 4806e49-4806e6f 3427->3541 3448->3447 3475 48063fa-4806409 3461->3475 3476 48064dd 3461->3476 3486 48064df 3475->3486 3487 480640f-48064ad 3475->3487 3476->3328 3510 48064e4-480652c 3486->3510 3487->3510 3626 48064af 3487->3626 3488->3489 3489->3418 3491 4806606 3489->3491 3491->3365 3510->3328 3539->3264 3620 4806ee6-4806fb9 3540->3620 3621 4806fbe-480704f 3540->3621 3617 4806eb0 3541->3617 3618 4806e71-4806e91 3541->3618 3558->3267 3564->3273 3580->3280 3598->3284 3617->3426 3618->3617 3619->3312 3620->3426 3621->3426 3627 4805365 3623->3627 3624->3627 3688 480535f call 4807340 3624->3688 3626->3461 3627->3247 3630->3318 3659->3413 3679->3217 3686->3275 3687->3275 3688->3627
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142647125.0000000004800000.00000040.00000800.00020000.00000000.sdmp, Offset: 04800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4800000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $\Ok$|t`$2k
                                    • API String ID: 0-3379087335
                                    • Opcode ID: e9378bd18c73d1e75746c36ddcfd1292f99b673270eb90ca8690863c7f650076
                                    • Instruction ID: 0fa11b678fcdea0257a92c19c8716e49d472d5b7949b3e4ba7d07044f9e28842
                                    • Opcode Fuzzy Hash: e9378bd18c73d1e75746c36ddcfd1292f99b673270eb90ca8690863c7f650076
                                    • Instruction Fuzzy Hash: 54F24C74A012288FDB29EF34DC54BA9B7B6FB48304F1041E9D909AB3A4DB355E85DF90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 3689 480492e-480497b 3696 480497d-4804983 call 4804208 3689->3696 3697 48049ce-48049e2 3689->3697 3701 4804988-4804993 3696->3701 3698 48049e4-48049ef 3697->3698 3699 4804a2a-4804a3e 3697->3699 3698->3699 3702 4804a44-4804b49 3699->3702 3703 4804b8c-4804ba0 3699->3703 3701->3697 3894 4804b51 3702->3894 3704 4804ba6-4804bba 3703->3704 3705 4804ccc-4804ce0 3703->3705 3708 4804bc8-4804bdc 3704->3708 3709 4804bbc-4804bc3 3704->3709 3710 4804ce6-4804f1a 3705->3710 3711 4804f6c-4804f80 3705->3711 3716 4804be7-4804bfb 3708->3716 3717 4804bde-4804be5 3708->3717 3713 4804c40-4804c54 3709->3713 4161 4804f25 3710->4161 3714 4804f82-4804f89 3711->3714 3715 4804fda-4804fee 3711->3715 3720 4804c56-4804c6c 3713->3720 3721 4804c6e-4804c7a 3713->3721 3741 4804f93 3714->3741 3724 4804ff0-4804ff6 3715->3724 3725 480503d-4805051 3715->3725 3718 4804c06-4804c1a 3716->3718 3719 4804bfd-4804c04 3716->3719 3717->3713 3728 4804c25-4804c39 3718->3728 3729 4804c1c-4804c23 3718->3729 3719->3713 3730 4804c85 3720->3730 3721->3730 3724->3725 3726 4805053 3725->3726 3727 480509a-48050ae 3725->3727 3726->3727 3732 48050b0-48050d9 3727->3732 3733 4805125-4805139 3727->3733 3728->3713 3734 4804c3b-4804c3d 3728->3734 3729->3713 3730->3705 3732->3733 3739 48053ac-48053c0 3733->3739 3740 480513f-480535b 3733->3740 3734->3713 3743 4805496-48054aa 3739->3743 3744 48053c6-48053d6 3739->3744 4105 480535d 3740->4105 4106 480535f 3740->4106 3741->3715 3747 48054b0-4805620 3743->3747 3748 4805667-480567b 3743->3748 4169 48053dc call 660606 3744->4169 4170 48053dc call 6605df 3744->4170 3747->3748 3753 4805681-480578c 3748->3753 3754 48057de-48057f2 3748->3754 4021 4805797 3753->4021 3757 4805955-4805969 3754->3757 3758 48057f8-4805903 3754->3758 3762 4805acc-4805ae0 3757->3762 3763 480596f-4805a7a 3757->3763 4040 480590e 3758->4040 3768 4805c43-4805c57 3762->3768 3769 4805ae6-4805bf1 3762->3769 4046 4805a85 3763->4046 3764 48053e2-4805448 3839 480544f 3764->3839 3772 4805dba-4805dce 3768->3772 3773 4805c5d-4805d68 3768->3773 4062 4805bfc 3769->4062 3782 4805f31-4805f45 3772->3782 3783 4805dd4-4805eea 3772->3783 4080 4805d73 3773->4080 3790 48060a8-48060bc 3782->3790 3791 4805f4b-4806061 3782->3791 3783->3782 3797 48060c2-48061cd 3790->3797 3798 480621f-4806233 3790->3798 3791->3790 4101 48061d8 3797->4101 3804 4806396-48063aa 3798->3804 3805 4806239-4806344 3798->3805 3813 48063b0-48063f5 call 4804270 3804->3813 3814 480652e-4806542 3804->3814 4112 480634f 3805->4112 3943 48064b5-48064d7 3813->3943 3825 4806685-4806699 3814->3825 3826 4806548-4806567 3814->3826 3829 48067e6-48067fa 3825->3829 3830 480669f-480679f 3825->3830 3848 480660c-480662e 3826->3848 3845 4806800-4806900 3829->3845 3846 4806947-480695b 3829->3846 3830->3829 3839->3743 3845->3846 3853 4806961-4806a61 3846->3853 3854 4806aa8-4806ad2 3846->3854 3861 4806634 3848->3861 3862 480656c-480657b 3848->3862 3853->3854 3872 4806b92-4806ba6 3854->3872 3873 4806ad8-4806b4b 3854->3873 3861->3825 3878 4806581-4806585 3862->3878 3879 4806636 3862->3879 3887 4806c83-4806c97 3872->3887 3888 4806bac-4806c3c 3872->3888 3873->3872 3904 4806590-48065b4 3878->3904 3900 480663b-4806683 3879->3900 3895 4806ddd-4806df1 3887->3895 3896 4806c9d-4806d8f 3887->3896 3888->3887 3894->3703 3908 4807054-4807068 3895->3908 3909 4806df7-4806e47 3895->3909 4141 4806d96 3896->4141 3900->3825 3970 48065b6-48065f0 3904->3970 3971 48065fb-4806604 3904->3971 3929 4807150-4807157 3908->3929 3930 480706e-4807109 call 4804270 * 2 3908->3930 4022 4806eb5-4806ee0 3909->4022 4023 4806e49-4806e6f 3909->4023 3930->3929 3957 48063fa-4806409 3943->3957 3958 48064dd 3943->3958 3968 48064df 3957->3968 3969 480640f-48064ad 3957->3969 3958->3814 3992 48064e4-480652c 3968->3992 3969->3992 4108 48064af 3969->4108 3970->3971 3971->3900 3973 4806606 3971->3973 3973->3848 3992->3814 4021->3754 4102 4806ee6-4806fb9 4022->4102 4103 4806fbe-480704f 4022->4103 4099 4806eb0 4023->4099 4100 4806e71-4806e91 4023->4100 4040->3757 4046->3762 4062->3768 4080->3772 4099->3908 4100->4099 4101->3798 4102->3908 4103->3908 4109 4805365 4105->4109 4106->4109 4168 480535f call 4807340 4106->4168 4108->3943 4109->3739 4112->3804 4141->3895 4161->3711 4168->4109 4169->3764 4170->3764
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142647125.0000000004800000.00000040.00000800.00020000.00000000.sdmp, Offset: 04800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4800000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $\Ok$|t`$2k
                                    • API String ID: 0-3379087335
                                    • Opcode ID: eac47323d8b81854d89670008a9dc5ab40c2fc7336d82c34dc5f725868cb531b
                                    • Instruction ID: 6210a3473e7d9d3ff7b2d4bf935e639338dcc5942e99e2a541fa3592908ba536
                                    • Opcode Fuzzy Hash: eac47323d8b81854d89670008a9dc5ab40c2fc7336d82c34dc5f725868cb531b
                                    • Instruction Fuzzy Hash: 85F25B74A012288FDB29EF34DC54BA9B7B6FB48304F1041E9D909AB3A4DB355E85DF90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 4171 4804995-48049e2 4178 48049e4-48049ef 4171->4178 4179 4804a2a-4804a3e 4171->4179 4178->4179 4180 4804a44-4804b49 4179->4180 4181 4804b8c-4804ba0 4179->4181 4371 4804b51 4180->4371 4182 4804ba6-4804bba 4181->4182 4183 4804ccc-4804ce0 4181->4183 4185 4804bc8-4804bdc 4182->4185 4186 4804bbc-4804bc3 4182->4186 4187 4804ce6-4804f1a 4183->4187 4188 4804f6c-4804f80 4183->4188 4193 4804be7-4804bfb 4185->4193 4194 4804bde-4804be5 4185->4194 4190 4804c40-4804c54 4186->4190 4638 4804f25 4187->4638 4191 4804f82-4804f89 4188->4191 4192 4804fda-4804fee 4188->4192 4197 4804c56-4804c6c 4190->4197 4198 4804c6e-4804c7a 4190->4198 4218 4804f93 4191->4218 4201 4804ff0-4804ff6 4192->4201 4202 480503d-4805051 4192->4202 4195 4804c06-4804c1a 4193->4195 4196 4804bfd-4804c04 4193->4196 4194->4190 4205 4804c25-4804c39 4195->4205 4206 4804c1c-4804c23 4195->4206 4196->4190 4207 4804c85 4197->4207 4198->4207 4201->4202 4203 4805053 4202->4203 4204 480509a-48050ae 4202->4204 4203->4204 4209 48050b0-48050d9 4204->4209 4210 4805125-4805139 4204->4210 4205->4190 4211 4804c3b-4804c3d 4205->4211 4206->4190 4207->4183 4209->4210 4216 48053ac-48053c0 4210->4216 4217 480513f-480535b 4210->4217 4211->4190 4220 4805496-48054aa 4216->4220 4221 48053c6-48053d6 4216->4221 4582 480535d 4217->4582 4583 480535f 4217->4583 4218->4192 4224 48054b0-4805620 4220->4224 4225 4805667-480567b 4220->4225 4646 48053dc call 660606 4221->4646 4647 48053dc call 6605df 4221->4647 4224->4225 4230 4805681-480578c 4225->4230 4231 48057de-48057f2 4225->4231 4498 4805797 4230->4498 4234 4805955-4805969 4231->4234 4235 48057f8-4805903 4231->4235 4239 4805acc-4805ae0 4234->4239 4240 480596f-4805a7a 4234->4240 4517 480590e 4235->4517 4245 4805c43-4805c57 4239->4245 4246 4805ae6-4805bf1 4239->4246 4523 4805a85 4240->4523 4241 48053e2-4805448 4316 480544f 4241->4316 4249 4805dba-4805dce 4245->4249 4250 4805c5d-4805d68 4245->4250 4539 4805bfc 4246->4539 4259 4805f31-4805f45 4249->4259 4260 4805dd4-4805eea 4249->4260 4557 4805d73 4250->4557 4267 48060a8-48060bc 4259->4267 4268 4805f4b-4806061 4259->4268 4260->4259 4274 48060c2-48061cd 4267->4274 4275 480621f-4806233 4267->4275 4268->4267 4578 48061d8 4274->4578 4281 4806396-48063aa 4275->4281 4282 4806239-4806344 4275->4282 4290 48063b0-48063f5 call 4804270 4281->4290 4291 480652e-4806542 4281->4291 4589 480634f 4282->4589 4420 48064b5-48064d7 4290->4420 4302 4806685-4806699 4291->4302 4303 4806548-4806567 4291->4303 4306 48067e6-48067fa 4302->4306 4307 480669f-480679f 4302->4307 4325 480660c-480662e 4303->4325 4322 4806800-4806900 4306->4322 4323 4806947-480695b 4306->4323 4307->4306 4316->4220 4322->4323 4330 4806961-4806a61 4323->4330 4331 4806aa8-4806ad2 4323->4331 4338 4806634 4325->4338 4339 480656c-480657b 4325->4339 4330->4331 4349 4806b92-4806ba6 4331->4349 4350 4806ad8-4806b4b 4331->4350 4338->4302 4355 4806581-4806585 4339->4355 4356 4806636 4339->4356 4364 4806c83-4806c97 4349->4364 4365 4806bac-4806c3c 4349->4365 4350->4349 4381 4806590-48065b4 4355->4381 4377 480663b-4806683 4356->4377 4372 4806ddd-4806df1 4364->4372 4373 4806c9d-4806d8f 4364->4373 4365->4364 4371->4181 4385 4807054-4807068 4372->4385 4386 4806df7-4806e47 4372->4386 4618 4806d96 4373->4618 4377->4302 4447 48065b6-48065f0 4381->4447 4448 48065fb-4806604 4381->4448 4406 4807150-4807157 4385->4406 4407 480706e-4807109 call 4804270 * 2 4385->4407 4499 4806eb5-4806ee0 4386->4499 4500 4806e49-4806e6f 4386->4500 4407->4406 4434 48063fa-4806409 4420->4434 4435 48064dd 4420->4435 4445 48064df 4434->4445 4446 480640f-48064ad 4434->4446 4435->4291 4469 48064e4-480652c 4445->4469 4446->4469 4585 48064af 4446->4585 4447->4448 4448->4377 4450 4806606 4448->4450 4450->4325 4469->4291 4498->4231 4579 4806ee6-4806fb9 4499->4579 4580 4806fbe-480704f 4499->4580 4576 4806eb0 4500->4576 4577 4806e71-4806e91 4500->4577 4517->4234 4523->4239 4539->4245 4557->4249 4576->4385 4577->4576 4578->4275 4579->4385 4580->4385 4586 4805365 4582->4586 4583->4586 4645 480535f call 4807340 4583->4645 4585->4420 4586->4216 4589->4281 4618->4372 4638->4188 4645->4586 4646->4241 4647->4241
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142647125.0000000004800000.00000040.00000800.00020000.00000000.sdmp, Offset: 04800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4800000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $\Ok$|t`$2k
                                    • API String ID: 0-3379087335
                                    • Opcode ID: 447af135bdc0b537ed0eab5111be60c8772a441673a7f1a6783579211a8043f0
                                    • Instruction ID: 947710ef531e3360f25fafa7870ce730e5aa899aa88e8511a3f70aedc7002c4d
                                    • Opcode Fuzzy Hash: 447af135bdc0b537ed0eab5111be60c8772a441673a7f1a6783579211a8043f0
                                    • Instruction Fuzzy Hash: 48F25B74A012288FDB29EF34DC54BA9B7B2FB48304F1041E9D909AB3A4DB355E85DF90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 4648 48049f1-4804a3e 4655 4804a44-4804b49 4648->4655 4656 4804b8c-4804ba0 4648->4656 4845 4804b51 4655->4845 4657 4804ba6-4804bba 4656->4657 4658 4804ccc-4804ce0 4656->4658 4659 4804bc8-4804bdc 4657->4659 4660 4804bbc-4804bc3 4657->4660 4661 4804ce6-4804f1a 4658->4661 4662 4804f6c-4804f80 4658->4662 4667 4804be7-4804bfb 4659->4667 4668 4804bde-4804be5 4659->4668 4664 4804c40-4804c54 4660->4664 5112 4804f25 4661->5112 4665 4804f82-4804f89 4662->4665 4666 4804fda-4804fee 4662->4666 4671 4804c56-4804c6c 4664->4671 4672 4804c6e-4804c7a 4664->4672 4692 4804f93 4665->4692 4675 4804ff0-4804ff6 4666->4675 4676 480503d-4805051 4666->4676 4669 4804c06-4804c1a 4667->4669 4670 4804bfd-4804c04 4667->4670 4668->4664 4679 4804c25-4804c39 4669->4679 4680 4804c1c-4804c23 4669->4680 4670->4664 4681 4804c85 4671->4681 4672->4681 4675->4676 4677 4805053 4676->4677 4678 480509a-48050ae 4676->4678 4677->4678 4683 48050b0-48050d9 4678->4683 4684 4805125-4805139 4678->4684 4679->4664 4685 4804c3b-4804c3d 4679->4685 4680->4664 4681->4658 4683->4684 4690 48053ac-48053c0 4684->4690 4691 480513f-480535b 4684->4691 4685->4664 4694 4805496-48054aa 4690->4694 4695 48053c6-48053d6 4690->4695 5056 480535d 4691->5056 5057 480535f 4691->5057 4692->4666 4698 48054b0-4805620 4694->4698 4699 4805667-480567b 4694->4699 5120 48053dc call 660606 4695->5120 5121 48053dc call 6605df 4695->5121 4698->4699 4704 4805681-480578c 4699->4704 4705 48057de-48057f2 4699->4705 4972 4805797 4704->4972 4708 4805955-4805969 4705->4708 4709 48057f8-4805903 4705->4709 4713 4805acc-4805ae0 4708->4713 4714 480596f-4805a7a 4708->4714 4991 480590e 4709->4991 4719 4805c43-4805c57 4713->4719 4720 4805ae6-4805bf1 4713->4720 4997 4805a85 4714->4997 4715 48053e2-4805448 4790 480544f 4715->4790 4723 4805dba-4805dce 4719->4723 4724 4805c5d-4805d68 4719->4724 5013 4805bfc 4720->5013 4733 4805f31-4805f45 4723->4733 4734 4805dd4-4805eea 4723->4734 5031 4805d73 4724->5031 4741 48060a8-48060bc 4733->4741 4742 4805f4b-4806061 4733->4742 4734->4733 4748 48060c2-48061cd 4741->4748 4749 480621f-4806233 4741->4749 4742->4741 5052 48061d8 4748->5052 4755 4806396-48063aa 4749->4755 4756 4806239-4806344 4749->4756 4764 48063b0-48063f5 call 4804270 4755->4764 4765 480652e-4806542 4755->4765 5063 480634f 4756->5063 4894 48064b5-48064d7 4764->4894 4776 4806685-4806699 4765->4776 4777 4806548-4806567 4765->4777 4780 48067e6-48067fa 4776->4780 4781 480669f-480679f 4776->4781 4799 480660c-480662e 4777->4799 4796 4806800-4806900 4780->4796 4797 4806947-480695b 4780->4797 4781->4780 4790->4694 4796->4797 4804 4806961-4806a61 4797->4804 4805 4806aa8-4806ad2 4797->4805 4812 4806634 4799->4812 4813 480656c-480657b 4799->4813 4804->4805 4823 4806b92-4806ba6 4805->4823 4824 4806ad8-4806b4b 4805->4824 4812->4776 4829 4806581-4806585 4813->4829 4830 4806636 4813->4830 4838 4806c83-4806c97 4823->4838 4839 4806bac-4806c3c 4823->4839 4824->4823 4855 4806590-48065b4 4829->4855 4851 480663b-4806683 4830->4851 4846 4806ddd-4806df1 4838->4846 4847 4806c9d-4806d8f 4838->4847 4839->4838 4845->4656 4859 4807054-4807068 4846->4859 4860 4806df7-4806e47 4846->4860 5092 4806d96 4847->5092 4851->4776 4921 48065b6-48065f0 4855->4921 4922 48065fb-4806604 4855->4922 4880 4807150-4807157 4859->4880 4881 480706e-4807109 call 4804270 * 2 4859->4881 4973 4806eb5-4806ee0 4860->4973 4974 4806e49-4806e6f 4860->4974 4881->4880 4908 48063fa-4806409 4894->4908 4909 48064dd 4894->4909 4919 48064df 4908->4919 4920 480640f-48064ad 4908->4920 4909->4765 4943 48064e4-480652c 4919->4943 4920->4943 5059 48064af 4920->5059 4921->4922 4922->4851 4924 4806606 4922->4924 4924->4799 4943->4765 4972->4705 5053 4806ee6-4806fb9 4973->5053 5054 4806fbe-480704f 4973->5054 5050 4806eb0 4974->5050 5051 4806e71-4806e91 4974->5051 4991->4708 4997->4713 5013->4719 5031->4723 5050->4859 5051->5050 5052->4749 5053->4859 5054->4859 5060 4805365 5056->5060 5057->5060 5119 480535f call 4807340 5057->5119 5059->4894 5060->4690 5063->4755 5092->4846 5112->4662 5119->5060 5120->4715 5121->4715
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142647125.0000000004800000.00000040.00000800.00020000.00000000.sdmp, Offset: 04800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4800000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $\Ok$|t`$2k
                                    • API String ID: 0-3379087335
                                    • Opcode ID: c16c0fe4d4a70773657a21643d2c3ef09eaab26cebeca6da9edfba137030c610
                                    • Instruction ID: b8f9d5b566b242f5903a794f65ba39d609bef7223b2c900002d36f99aa822740
                                    • Opcode Fuzzy Hash: c16c0fe4d4a70773657a21643d2c3ef09eaab26cebeca6da9edfba137030c610
                                    • Instruction Fuzzy Hash: 0CF25B74A012288FDB29EF34DC54BA9B7B6FB48304F1041E9D909AB3A4DB355E85DF90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 5580 4804c87-4804ce0 5587 4804ce6-4804f1a 5580->5587 5588 4804f6c-4804f80 5580->5588 6012 4804f25 5587->6012 5589 4804f82-4804f89 5588->5589 5590 4804fda-4804fee 5588->5590 5603 4804f93 5589->5603 5592 4804ff0-4804ff6 5590->5592 5593 480503d-4805051 5590->5593 5592->5593 5594 4805053 5593->5594 5595 480509a-48050ae 5593->5595 5594->5595 5597 48050b0-48050d9 5595->5597 5598 4805125-4805139 5595->5598 5597->5598 5601 48053ac-48053c0 5598->5601 5602 480513f-480535b 5598->5602 5604 4805496-48054aa 5601->5604 5605 48053c6-48053d6 5601->5605 5956 480535d 5602->5956 5957 480535f 5602->5957 5603->5590 5608 48054b0-4805620 5604->5608 5609 4805667-480567b 5604->5609 6020 48053dc call 660606 5605->6020 6021 48053dc call 6605df 5605->6021 5608->5609 5613 4805681-480578c 5609->5613 5614 48057de-48057f2 5609->5614 5872 4805797 5613->5872 5617 4805955-4805969 5614->5617 5618 48057f8-4805903 5614->5618 5621 4805acc-4805ae0 5617->5621 5622 480596f-4805a7a 5617->5622 5891 480590e 5618->5891 5627 4805c43-4805c57 5621->5627 5628 4805ae6-4805bf1 5621->5628 5897 4805a85 5622->5897 5623 48053e2-4805448 5694 480544f 5623->5694 5631 4805dba-4805dce 5627->5631 5632 4805c5d-4805d68 5627->5632 5913 4805bfc 5628->5913 5640 4805f31-4805f45 5631->5640 5641 4805dd4-4805eea 5631->5641 5931 4805d73 5632->5931 5647 48060a8-48060bc 5640->5647 5648 4805f4b-4806061 5640->5648 5641->5640 5652 48060c2-48061cd 5647->5652 5653 480621f-4806233 5647->5653 5648->5647 5952 48061d8 5652->5952 5661 4806396-48063aa 5653->5661 5662 4806239-4806344 5653->5662 5669 48063b0-48063f5 call 4804270 5661->5669 5670 480652e-4806542 5661->5670 5963 480634f 5662->5963 5794 48064b5-48064d7 5669->5794 5680 4806685-4806699 5670->5680 5681 4806548-4806567 5670->5681 5684 48067e6-48067fa 5680->5684 5685 480669f-480679f 5680->5685 5702 480660c-480662e 5681->5702 5700 4806800-4806900 5684->5700 5701 4806947-480695b 5684->5701 5685->5684 5694->5604 5700->5701 5707 4806961-4806a61 5701->5707 5708 4806aa8-4806ad2 5701->5708 5714 4806634 5702->5714 5715 480656c-480657b 5702->5715 5707->5708 5724 4806b92-4806ba6 5708->5724 5725 4806ad8-4806b4b 5708->5725 5714->5680 5730 4806581-4806585 5715->5730 5731 4806636 5715->5731 5739 4806c83-4806c97 5724->5739 5740 4806bac-4806c3c 5724->5740 5725->5724 5755 4806590-48065b4 5730->5755 5751 480663b-4806683 5731->5751 5746 4806ddd-4806df1 5739->5746 5747 4806c9d-4806d8f 5739->5747 5740->5739 5759 4807054-4807068 5746->5759 5760 4806df7-4806e47 5746->5760 5992 4806d96 5747->5992 5751->5680 5821 48065b6-48065f0 5755->5821 5822 48065fb-4806604 5755->5822 5780 4807150-4807157 5759->5780 5781 480706e-4807109 call 4804270 * 2 5759->5781 5873 4806eb5-4806ee0 5760->5873 5874 4806e49-4806e6f 5760->5874 5781->5780 5808 48063fa-4806409 5794->5808 5809 48064dd 5794->5809 5819 48064df 5808->5819 5820 480640f-48064ad 5808->5820 5809->5670 5843 48064e4-480652c 5819->5843 5820->5843 5959 48064af 5820->5959 5821->5822 5822->5751 5824 4806606 5822->5824 5824->5702 5843->5670 5872->5614 5953 4806ee6-4806fb9 5873->5953 5954 4806fbe-480704f 5873->5954 5950 4806eb0 5874->5950 5951 4806e71-4806e91 5874->5951 5891->5617 5897->5621 5913->5627 5931->5631 5950->5759 5951->5950 5952->5653 5953->5759 5954->5759 5960 4805365 5956->5960 5957->5960 6019 480535f call 4807340 5957->6019 5959->5794 5960->5601 5963->5661 5992->5746 6012->5588 6019->5960 6020->5623 6021->5623
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142647125.0000000004800000.00000040.00000800.00020000.00000000.sdmp, Offset: 04800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4800000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \Ok$|t`$2k
                                    • API String ID: 0-2445104521
                                    • Opcode ID: 9f7236d88dd68a5043a96996e3994c10193fafd73cbce13287ce67c91eddaa8a
                                    • Instruction ID: f3959018e9ea9fb531a2b23dd1478e614a9868add6b2d0392a28999291defebb
                                    • Opcode Fuzzy Hash: 9f7236d88dd68a5043a96996e3994c10193fafd73cbce13287ce67c91eddaa8a
                                    • Instruction Fuzzy Hash: BBE26C74A012288FDB29EF34DC54BA9B7B2FB48304F1041E9D949AB3A4DB355E85DF90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 6090 4804f27-4804f80 6097 4804f82-4804f89 6090->6097 6098 4804fda-4804fee 6090->6098 6109 4804f93 6097->6109 6099 4804ff0-4804ff6 6098->6099 6100 480503d-4805051 6098->6100 6099->6100 6101 4805053 6100->6101 6102 480509a-48050ae 6100->6102 6101->6102 6104 48050b0-48050d9 6102->6104 6105 4805125-4805139 6102->6105 6104->6105 6107 48053ac-48053c0 6105->6107 6108 480513f-480535b 6105->6108 6110 4805496-48054aa 6107->6110 6111 48053c6-48053d6 6107->6111 6440 480535d 6108->6440 6441 480535f 6108->6441 6109->6098 6113 48054b0-4805620 6110->6113 6114 4805667-480567b 6110->6114 6496 48053dc call 660606 6111->6496 6497 48053dc call 6605df 6111->6497 6113->6114 6118 4805681-480578c 6114->6118 6119 48057de-48057f2 6114->6119 6364 4805797 6118->6364 6121 4805955-4805969 6119->6121 6122 48057f8-4805903 6119->6122 6124 4805acc-4805ae0 6121->6124 6125 480596f-4805a7a 6121->6125 6379 480590e 6122->6379 6130 4805c43-4805c57 6124->6130 6131 4805ae6-4805bf1 6124->6131 6388 4805a85 6125->6388 6126 48053e2-4805448 6193 480544f 6126->6193 6134 4805dba-4805dce 6130->6134 6135 4805c5d-4805d68 6130->6135 6409 4805bfc 6131->6409 6142 4805f31-4805f45 6134->6142 6143 4805dd4-4805eea 6134->6143 6419 4805d73 6135->6419 6148 48060a8-48060bc 6142->6148 6149 4805f4b-4806061 6142->6149 6143->6142 6153 48060c2-48061cd 6148->6153 6154 480621f-4806233 6148->6154 6149->6148 6442 48061d8 6153->6442 6160 4806396-48063aa 6154->6160 6161 4806239-4806344 6154->6161 6169 48063b0-48063f5 call 4804270 6160->6169 6170 480652e-4806542 6160->6170 6449 480634f 6161->6449 6288 48064b5-48064d7 6169->6288 6179 4806685-4806699 6170->6179 6180 4806548-4806567 6170->6180 6183 48067e6-48067fa 6179->6183 6184 480669f-480679f 6179->6184 6200 480660c-480662e 6180->6200 6198 4806800-4806900 6183->6198 6199 4806947-480695b 6183->6199 6184->6183 6193->6110 6198->6199 6205 4806961-4806a61 6199->6205 6206 4806aa8-4806ad2 6199->6206 6212 4806634 6200->6212 6213 480656c-480657b 6200->6213 6205->6206 6221 4806b92-4806ba6 6206->6221 6222 4806ad8-4806b4b 6206->6222 6212->6179 6227 4806581-4806585 6213->6227 6228 4806636 6213->6228 6235 4806c83-4806c97 6221->6235 6236 4806bac-4806c3c 6221->6236 6222->6221 6251 4806590-48065b4 6227->6251 6247 480663b-4806683 6228->6247 6242 4806ddd-4806df1 6235->6242 6243 4806c9d-4806d8f 6235->6243 6236->6235 6255 4807054-4807068 6242->6255 6256 4806df7-4806e47 6242->6256 6475 4806d96 6243->6475 6247->6179 6314 48065b6-48065f0 6251->6314 6315 48065fb-4806604 6251->6315 6275 4807150-4807157 6255->6275 6276 480706e-4807109 call 4804270 * 2 6255->6276 6365 4806eb5-4806ee0 6256->6365 6366 4806e49-4806e6f 6256->6366 6276->6275 6302 48063fa-4806409 6288->6302 6303 48064dd 6288->6303 6312 48064df 6302->6312 6313 480640f-48064ad 6302->6313 6303->6170 6333 48064e4-480652c 6312->6333 6313->6333 6444 48064af 6313->6444 6314->6315 6315->6247 6318 4806606 6315->6318 6318->6200 6333->6170 6364->6119 6445 4806ee6-4806fb9 6365->6445 6446 4806fbe-480704f 6365->6446 6438 4806eb0 6366->6438 6439 4806e71-4806e91 6366->6439 6379->6121 6388->6124 6409->6130 6419->6134 6438->6255 6439->6438 6450 4805365 6440->6450 6441->6450 6495 480535f call 4807340 6441->6495 6442->6154 6444->6288 6445->6255 6446->6255 6449->6160 6450->6107 6475->6242 6495->6450 6496->6126 6497->6126
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142647125.0000000004800000.00000040.00000800.00020000.00000000.sdmp, Offset: 04800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4800000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \Ok$|t`$2k
                                    • API String ID: 0-2445104521
                                    • Opcode ID: 394a82703d2b2d02ae78c30ee41ad4c857c04a9d95f3df530c2f7dd9e9a1771d
                                    • Instruction ID: d6e56dff7c350865eb8594335e5548839f0973cd544626688002e829af26c693
                                    • Opcode Fuzzy Hash: 394a82703d2b2d02ae78c30ee41ad4c857c04a9d95f3df530c2f7dd9e9a1771d
                                    • Instruction Fuzzy Hash: CAD25B74A012288FDB29EF34DC54BA9B7B6BB48304F1041E9D849AB3A4DB355E85DF90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 6498 4804f95-4804fee 6505 4804ff0-4804ff6 6498->6505 6506 480503d-4805051 6498->6506 6505->6506 6507 4805053 6506->6507 6508 480509a-48050ae 6506->6508 6507->6508 6509 48050b0-48050d9 6508->6509 6510 4805125-4805139 6508->6510 6509->6510 6512 48053ac-48053c0 6510->6512 6513 480513f-480535b 6510->6513 6514 4805496-48054aa 6512->6514 6515 48053c6-48053d6 6512->6515 6844 480535d 6513->6844 6845 480535f 6513->6845 6517 48054b0-4805620 6514->6517 6518 4805667-480567b 6514->6518 6900 48053dc call 660606 6515->6900 6901 48053dc call 6605df 6515->6901 6517->6518 6522 4805681-480578c 6518->6522 6523 48057de-48057f2 6518->6523 6768 4805797 6522->6768 6525 4805955-4805969 6523->6525 6526 48057f8-4805903 6523->6526 6528 4805acc-4805ae0 6525->6528 6529 480596f-4805a7a 6525->6529 6783 480590e 6526->6783 6534 4805c43-4805c57 6528->6534 6535 4805ae6-4805bf1 6528->6535 6792 4805a85 6529->6792 6530 48053e2-4805448 6597 480544f 6530->6597 6538 4805dba-4805dce 6534->6538 6539 4805c5d-4805d68 6534->6539 6813 4805bfc 6535->6813 6546 4805f31-4805f45 6538->6546 6547 4805dd4-4805eea 6538->6547 6823 4805d73 6539->6823 6552 48060a8-48060bc 6546->6552 6553 4805f4b-4806061 6546->6553 6547->6546 6557 48060c2-48061cd 6552->6557 6558 480621f-4806233 6552->6558 6553->6552 6846 48061d8 6557->6846 6564 4806396-48063aa 6558->6564 6565 4806239-4806344 6558->6565 6573 48063b0-48063f5 call 4804270 6564->6573 6574 480652e-4806542 6564->6574 6853 480634f 6565->6853 6692 48064b5-48064d7 6573->6692 6583 4806685-4806699 6574->6583 6584 4806548-4806567 6574->6584 6587 48067e6-48067fa 6583->6587 6588 480669f-480679f 6583->6588 6604 480660c-480662e 6584->6604 6602 4806800-4806900 6587->6602 6603 4806947-480695b 6587->6603 6588->6587 6597->6514 6602->6603 6609 4806961-4806a61 6603->6609 6610 4806aa8-4806ad2 6603->6610 6616 4806634 6604->6616 6617 480656c-480657b 6604->6617 6609->6610 6625 4806b92-4806ba6 6610->6625 6626 4806ad8-4806b4b 6610->6626 6616->6583 6631 4806581-4806585 6617->6631 6632 4806636 6617->6632 6639 4806c83-4806c97 6625->6639 6640 4806bac-4806c3c 6625->6640 6626->6625 6655 4806590-48065b4 6631->6655 6651 480663b-4806683 6632->6651 6646 4806ddd-4806df1 6639->6646 6647 4806c9d-4806d8f 6639->6647 6640->6639 6659 4807054-4807068 6646->6659 6660 4806df7-4806e47 6646->6660 6879 4806d96 6647->6879 6651->6583 6718 48065b6-48065f0 6655->6718 6719 48065fb-4806604 6655->6719 6679 4807150-4807157 6659->6679 6680 480706e-4807109 call 4804270 * 2 6659->6680 6769 4806eb5-4806ee0 6660->6769 6770 4806e49-4806e6f 6660->6770 6680->6679 6706 48063fa-4806409 6692->6706 6707 48064dd 6692->6707 6716 48064df 6706->6716 6717 480640f-48064ad 6706->6717 6707->6574 6737 48064e4-480652c 6716->6737 6717->6737 6848 48064af 6717->6848 6718->6719 6719->6651 6722 4806606 6719->6722 6722->6604 6737->6574 6768->6523 6849 4806ee6-4806fb9 6769->6849 6850 4806fbe-480704f 6769->6850 6842 4806eb0 6770->6842 6843 4806e71-4806e91 6770->6843 6783->6525 6792->6528 6813->6534 6823->6538 6842->6659 6843->6842 6854 4805365 6844->6854 6845->6854 6899 480535f call 4807340 6845->6899 6846->6558 6848->6692 6849->6659 6850->6659 6853->6564 6854->6512 6879->6646 6899->6854 6900->6530 6901->6530
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142647125.0000000004800000.00000040.00000800.00020000.00000000.sdmp, Offset: 04800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4800000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \Ok$|t`$2k
                                    • API String ID: 0-2445104521
                                    • Opcode ID: b1a9b65a5c6e700fc56b1c94a76764a30f8b270eeb992cfec698880d6e0e8f74
                                    • Instruction ID: 0b28ac7e1b3c307adb58bd54e927cc43711509b94da1769942ed2b25ccbcd288
                                    • Opcode Fuzzy Hash: b1a9b65a5c6e700fc56b1c94a76764a30f8b270eeb992cfec698880d6e0e8f74
                                    • Instruction Fuzzy Hash: 54D25B74A012288FDB29EF34DC54BA9B7B6BB48304F1041E9D849AB3A4DB355E85DF90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 6902 4804ff8-4805051 6909 4805053 6902->6909 6910 480509a-48050ae 6902->6910 6909->6910 6911 48050b0-48050d9 6910->6911 6912 4805125-4805139 6910->6912 6911->6912 6913 48053ac-48053c0 6912->6913 6914 480513f-480535b 6912->6914 6915 4805496-48054aa 6913->6915 6916 48053c6-48053d6 6913->6916 7245 480535d 6914->7245 7246 480535f 6914->7246 6918 48054b0-4805620 6915->6918 6919 4805667-480567b 6915->6919 7300 48053dc call 660606 6916->7300 7301 48053dc call 6605df 6916->7301 6918->6919 6923 4805681-480578c 6919->6923 6924 48057de-48057f2 6919->6924 7169 4805797 6923->7169 6926 4805955-4805969 6924->6926 6927 48057f8-4805903 6924->6927 6929 4805acc-4805ae0 6926->6929 6930 480596f-4805a7a 6926->6930 7184 480590e 6927->7184 6935 4805c43-4805c57 6929->6935 6936 4805ae6-4805bf1 6929->6936 7193 4805a85 6930->7193 6931 48053e2-4805448 6998 480544f 6931->6998 6939 4805dba-4805dce 6935->6939 6940 4805c5d-4805d68 6935->6940 7214 4805bfc 6936->7214 6947 4805f31-4805f45 6939->6947 6948 4805dd4-4805eea 6939->6948 7224 4805d73 6940->7224 6953 48060a8-48060bc 6947->6953 6954 4805f4b-4806061 6947->6954 6948->6947 6958 48060c2-48061cd 6953->6958 6959 480621f-4806233 6953->6959 6954->6953 7247 48061d8 6958->7247 6965 4806396-48063aa 6959->6965 6966 4806239-4806344 6959->6966 6974 48063b0-48063f5 call 4804270 6965->6974 6975 480652e-4806542 6965->6975 7254 480634f 6966->7254 7093 48064b5-48064d7 6974->7093 6984 4806685-4806699 6975->6984 6985 4806548-4806567 6975->6985 6988 48067e6-48067fa 6984->6988 6989 480669f-480679f 6984->6989 7005 480660c-480662e 6985->7005 7003 4806800-4806900 6988->7003 7004 4806947-480695b 6988->7004 6989->6988 6998->6915 7003->7004 7010 4806961-4806a61 7004->7010 7011 4806aa8-4806ad2 7004->7011 7017 4806634 7005->7017 7018 480656c-480657b 7005->7018 7010->7011 7026 4806b92-4806ba6 7011->7026 7027 4806ad8-4806b4b 7011->7027 7017->6984 7032 4806581-4806585 7018->7032 7033 4806636 7018->7033 7040 4806c83-4806c97 7026->7040 7041 4806bac-4806c3c 7026->7041 7027->7026 7056 4806590-48065b4 7032->7056 7052 480663b-4806683 7033->7052 7047 4806ddd-4806df1 7040->7047 7048 4806c9d-4806d8f 7040->7048 7041->7040 7060 4807054-4807068 7047->7060 7061 4806df7-4806e47 7047->7061 7280 4806d96 7048->7280 7052->6984 7119 48065b6-48065f0 7056->7119 7120 48065fb-4806604 7056->7120 7080 4807150-4807157 7060->7080 7081 480706e-4807109 call 4804270 * 2 7060->7081 7170 4806eb5-4806ee0 7061->7170 7171 4806e49-4806e6f 7061->7171 7081->7080 7107 48063fa-4806409 7093->7107 7108 48064dd 7093->7108 7117 48064df 7107->7117 7118 480640f-48064ad 7107->7118 7108->6975 7138 48064e4-480652c 7117->7138 7118->7138 7249 48064af 7118->7249 7119->7120 7120->7052 7123 4806606 7120->7123 7123->7005 7138->6975 7169->6924 7250 4806ee6-4806fb9 7170->7250 7251 4806fbe-480704f 7170->7251 7243 4806eb0 7171->7243 7244 4806e71-4806e91 7171->7244 7184->6926 7193->6929 7214->6935 7224->6939 7243->7060 7244->7243 7255 4805365 7245->7255 7246->7255 7302 480535f call 4807340 7246->7302 7247->6959 7249->7093 7250->7060 7251->7060 7254->6965 7255->6913 7280->7047 7300->6931 7301->6931 7302->7255
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142647125.0000000004800000.00000040.00000800.00020000.00000000.sdmp, Offset: 04800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4800000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \Ok$|t`$2k
                                    • API String ID: 0-2445104521
                                    • Opcode ID: 0c97ccf3d4a4090ef66cae8f6d2ff22c631f2594eace58928e1e8580fd567c7b
                                    • Instruction ID: 982ec03a32ab3800e888410ea7ffe382e4fbf3899be4583764b5a7298e5ba220
                                    • Opcode Fuzzy Hash: 0c97ccf3d4a4090ef66cae8f6d2ff22c631f2594eace58928e1e8580fd567c7b
                                    • Instruction Fuzzy Hash: 7CD25C74A012288FDB29EF30DC54BA9B7B6FB48304F1041E9D849AB3A4DB355E85DF90
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142647125.0000000004800000.00000040.00000800.00020000.00000000.sdmp, Offset: 04800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4800000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \Ok$|t`$2k
                                    • API String ID: 0-2445104521
                                    • Opcode ID: 95f0c85c603d357af95f5c4bc7c32e2f9d6852590f425e4b51e62a8332d7cc69
                                    • Instruction ID: a8da851df1ee2902d9177d2e386024639a2320cece4c2269f4526496193d6e2e
                                    • Opcode Fuzzy Hash: 95f0c85c603d357af95f5c4bc7c32e2f9d6852590f425e4b51e62a8332d7cc69
                                    • Instruction Fuzzy Hash: E9D25C74A012288FDB29EF30DC54BA9B7B6FB48304F1041E9D949AB3A4DB355E85DF90
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142647125.0000000004800000.00000040.00000800.00020000.00000000.sdmp, Offset: 04800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4800000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: L.k
                                    • API String ID: 0-2092726967
                                    • Opcode ID: 4b0ac8b70ae218475bf85eb938fb93e94298ed56fdbb5e516fa5815c98282f78
                                    • Instruction ID: 4cc935129584b77e6f72c59dc802bba293d89262d1dfd00ecc84cdfae602f88e
                                    • Opcode Fuzzy Hash: 4b0ac8b70ae218475bf85eb938fb93e94298ed56fdbb5e516fa5815c98282f78
                                    • Instruction Fuzzy Hash: 4F2223717012528BDB69EB32D85067E73E2AF88205B14CA75E491CB2D5EF38FC86D790
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142647125.0000000004800000.00000040.00000800.00020000.00000000.sdmp, Offset: 04800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4800000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 41fc6009fc61a6a8ba466f7285746f5a93e9494752d7e977923bcf2629ebe97d
                                    • Instruction ID: 7877761a2fe9bdb3487ab63b9c81725026c1cc554004e69f8256f8e33ac1ca3b
                                    • Opcode Fuzzy Hash: 41fc6009fc61a6a8ba466f7285746f5a93e9494752d7e977923bcf2629ebe97d
                                    • Instruction Fuzzy Hash: 4F023873A112629BDB699F328C5047DB361BB80355341CA76E891DB2E8EF39FC81C780

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 6022 48000b8-48000cd 6058 48000d0 call 660606 6022->6058 6059 48000d0 call 5fa20c 6022->6059 6060 48000d0 call 5fa23a 6022->6060 6061 48000d0 call 6605df 6022->6061 6024 48000d5-48000f7 6027 48000f9-480010a 6024->6027 6028 480010b-480011a 6024->6028 6031 4800120-4800122 6028->6031 6032 480011c-480011e 6028->6032 6033 4800124-4800127 6031->6033 6034 4800128-48001d5 6031->6034 6032->6031 6033->6034 6048 48001d5 call 660606 6034->6048 6049 48001d5 call 4803fc0 6034->6049 6050 48001d5 call 4803b10 6034->6050 6051 48001d5 call 4803dc4 6034->6051 6052 48001d5 call 48039b7 6034->6052 6053 48001d5 call 4804147 6034->6053 6054 48001d5 call 6605df 6034->6054 6055 48001d5 call 4803cf9 6034->6055 6056 48001d5 call 48037f9 6034->6056 6057 48001d5 call 4803c5e 6034->6057 6047 48001db-48001de 6048->6047 6049->6047 6050->6047 6051->6047 6052->6047 6053->6047 6054->6047 6055->6047 6056->6047 6057->6047 6058->6024 6059->6024 6060->6024 6061->6024
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142647125.0000000004800000.00000040.00000800.00020000.00000000.sdmp, Offset: 04800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4800000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 2k$2k$5]!l^$E]!l^
                                    • API String ID: 0-690951654
                                    • Opcode ID: 891efd4cf2a2f5222ab008b380097b41208f2f1a309c0a4bd7a2f51396dc31a0
                                    • Instruction ID: f449d574d6e0b07b9efe50fbc8e8ade6f0441b7ed70744feb32c1da9ddd380d5
                                    • Opcode Fuzzy Hash: 891efd4cf2a2f5222ab008b380097b41208f2f1a309c0a4bd7a2f51396dc31a0
                                    • Instruction Fuzzy Hash: E431C9316043445FD719AB74A812A6E7B6B5BC2254F1449AED001DF3D2DF7A5C4AC3A2

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 6062 4800118-480011a 6063 4800120-4800122 6062->6063 6064 480011c-480011e 6062->6064 6065 4800124-4800127 6063->6065 6066 4800128-4800169 6063->6066 6064->6063 6065->6066 6071 4800174-480017a 6066->6071 6072 4800181-48001bd 6071->6072 6077 48001c8-48001d5 6072->6077 6080 48001d5 call 660606 6077->6080 6081 48001d5 call 4803fc0 6077->6081 6082 48001d5 call 4803b10 6077->6082 6083 48001d5 call 4803dc4 6077->6083 6084 48001d5 call 48039b7 6077->6084 6085 48001d5 call 4804147 6077->6085 6086 48001d5 call 6605df 6077->6086 6087 48001d5 call 4803cf9 6077->6087 6088 48001d5 call 48037f9 6077->6088 6089 48001d5 call 4803c5e 6077->6089 6079 48001db-48001de 6080->6079 6081->6079 6082->6079 6083->6079 6084->6079 6085->6079 6086->6079 6087->6079 6088->6079 6089->6079
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142647125.0000000004800000.00000040.00000800.00020000.00000000.sdmp, Offset: 04800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4800000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 2k$2k$5]!l^$E]!l^
                                    • API String ID: 0-690951654
                                    • Opcode ID: 2c047701b600f6285a0b0340083576cbfdf7334f1f85b8ef3f68043889dc248a
                                    • Instruction ID: 284bcc3459bfd8a9d0ed4e54ff5faf3cad998ce494444de2206ef056855c64fd
                                    • Opcode Fuzzy Hash: 2c047701b600f6285a0b0340083576cbfdf7334f1f85b8ef3f68043889dc248a
                                    • Instruction Fuzzy Hash: 061106317042404FC319AB78B416ABE3B9B5BC624872459BED002CF396CFBD4C4A87E2
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142647125.0000000004800000.00000040.00000800.00020000.00000000.sdmp, Offset: 04800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4800000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: tf$2k$}X!l^
                                    • API String ID: 0-537504357
                                    • Opcode ID: 553cf4ac6466e4365cdcf8b3f175be9a263339329b39e69bc35bf8a8c5835d02
                                    • Instruction ID: 98097a3048ad5442d8a5f5395886add16d5f11238e10acf5574010c98c09b048
                                    • Opcode Fuzzy Hash: 553cf4ac6466e4365cdcf8b3f175be9a263339329b39e69bc35bf8a8c5835d02
                                    • Instruction Fuzzy Hash: C6A1D4307106118BD768FB38CC45B6D32A2AB84354F548A78D421DB3E5EF39ED86DBA0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142647125.0000000004800000.00000040.00000800.00020000.00000000.sdmp, Offset: 04800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4800000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: HQ`$XR`$P`
                                    • API String ID: 0-1163813928
                                    • Opcode ID: 40dad9ad5b16def053ed0ccd9e3b94752208c1262120c6ff8ef831bc26a0e644
                                    • Instruction ID: 23ac1405e8a0674a7eb75f29abfdd352024b4cf96a00de5e0877e5ed4a7c0621
                                    • Opcode Fuzzy Hash: 40dad9ad5b16def053ed0ccd9e3b94752208c1262120c6ff8ef831bc26a0e644
                                    • Instruction Fuzzy Hash: 810144706116029BC724EF38D54C95E7BE2AFC4309B40892CA14587764DF3899489B83
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142647125.0000000004800000.00000040.00000800.00020000.00000000.sdmp, Offset: 04800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4800000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \Ok$2k
                                    • API String ID: 0-3697909212
                                    • Opcode ID: c8f4df9d6a86e2b27f33c3512f78e6028d5f1434c06481f76101cdd594b7ed63
                                    • Instruction ID: b673a212bf81fb9a9d35745b41722c99255ca167e771650a5e30f311eb4f36bc
                                    • Opcode Fuzzy Hash: c8f4df9d6a86e2b27f33c3512f78e6028d5f1434c06481f76101cdd594b7ed63
                                    • Instruction Fuzzy Hash: 9D324D70A00218CFCB28EF74D955BEDB7B2AF49308F1045A9D509AB3A4DB395E86DF50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142647125.0000000004800000.00000040.00000800.00020000.00000000.sdmp, Offset: 04800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4800000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \Ok
                                    • API String ID: 0-3677890257
                                    • Opcode ID: 6351136cda879a7624ce45eeff3e9c3b73fe2e4f9a8540a29bbd38fd004bd00e
                                    • Instruction ID: 303f8603aa9c7cf95ef5fa6ce1c0d7a7207b6ba71e7961f9548e025785f85dbf
                                    • Opcode Fuzzy Hash: 6351136cda879a7624ce45eeff3e9c3b73fe2e4f9a8540a29bbd38fd004bd00e
                                    • Instruction Fuzzy Hash: ADB20C74A01228CFDB29EF20DC54BA9B7B6FB48304F5041E9D9096B3A8DB355E85DF90
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142647125.0000000004800000.00000040.00000800.00020000.00000000.sdmp, Offset: 04800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4800000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \Ok
                                    • API String ID: 0-3677890257
                                    • Opcode ID: 3c8d09e047c5e0cd97067f2f73038d90b9ad6689e9f66afb633b6eeaea8304c7
                                    • Instruction ID: 5bdad5b775a7dcb325f0e0bd1aee18b706e068a855561b47a7878a38467ac157
                                    • Opcode Fuzzy Hash: 3c8d09e047c5e0cd97067f2f73038d90b9ad6689e9f66afb633b6eeaea8304c7
                                    • Instruction Fuzzy Hash: 13A21C74A01228CFDB29EF20DC54BA9B7B6FB48304F5041E9D909AB3A4DB355E85DF90
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142647125.0000000004800000.00000040.00000800.00020000.00000000.sdmp, Offset: 04800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4800000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \Ok
                                    • API String ID: 0-3677890257
                                    • Opcode ID: df7186d98b47f24c8509c2602ca684e7af90646b751da90d2a3e57dd1ab2fcfa
                                    • Instruction ID: 46ebf520cb67bef4fe85fcd93735dc7d3ff7f695d66c706a28161182f19bd531
                                    • Opcode Fuzzy Hash: df7186d98b47f24c8509c2602ca684e7af90646b751da90d2a3e57dd1ab2fcfa
                                    • Instruction Fuzzy Hash: 71921C74A01228CFDB29EF20DC54BA9B7B6FB48304F1041E9D909AB3A4DB355E85DF90
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142647125.0000000004800000.00000040.00000800.00020000.00000000.sdmp, Offset: 04800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4800000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \Ok
                                    • API String ID: 0-3677890257
                                    • Opcode ID: 667bf8eb0a0672f962c9326755fa9f2df2d0fd8f6c1b291c9c7a8f111cce5d53
                                    • Instruction ID: f3b83025001d36d79f0ad233b1fdeb7a05999d9479df88f6dd11507adb2046b8
                                    • Opcode Fuzzy Hash: 667bf8eb0a0672f962c9326755fa9f2df2d0fd8f6c1b291c9c7a8f111cce5d53
                                    • Instruction Fuzzy Hash: 2D922D74A01228CFDB29EF34D854BA9B7B6FB48304F1041E9D909AB3A4DB359E85DF50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142647125.0000000004800000.00000040.00000800.00020000.00000000.sdmp, Offset: 04800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4800000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \Ok
                                    • API String ID: 0-3677890257
                                    • Opcode ID: 96ca0d9847c2ddeedcf43d1a8285d9058f4357f035e28f5f60d97fac7411c2d6
                                    • Instruction ID: 5f0e570cee5cd55000e30d7bc6e0a8f1cf8bc69f527258c74f5ee070d131629e
                                    • Opcode Fuzzy Hash: 96ca0d9847c2ddeedcf43d1a8285d9058f4357f035e28f5f60d97fac7411c2d6
                                    • Instruction Fuzzy Hash: 8F823C74A01228CFDB29EF34D854BA9B7B6FB48304F1041E9D909AB3A4DB359E85DF50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142647125.0000000004800000.00000040.00000800.00020000.00000000.sdmp, Offset: 04800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4800000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \Ok
                                    • API String ID: 0-3677890257
                                    • Opcode ID: 6d89f43c8c289714c9f8a853d87015362e91e4baa0b03913e7bbf425cabff507
                                    • Instruction ID: 901e9d2174aaa1343a0721d4ccdea6ecbfe5ad544491ce658fd51f6cd924d2b3
                                    • Opcode Fuzzy Hash: 6d89f43c8c289714c9f8a853d87015362e91e4baa0b03913e7bbf425cabff507
                                    • Instruction Fuzzy Hash: D5623B74A01228CFDB29EF34D854BA9B7B6BB48304F5041E9D909AB3A4DB359F85DF40
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142647125.0000000004800000.00000040.00000800.00020000.00000000.sdmp, Offset: 04800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4800000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \Ok
                                    • API String ID: 0-3677890257
                                    • Opcode ID: 1a22e6d7dc0c42b668719fbc1e7c6751c1b95cca87444fa4a2eba016f9218269
                                    • Instruction ID: 295c063b9425a5704035303aa127295fac0d114226b3b470201d335ad9ecdf52
                                    • Opcode Fuzzy Hash: 1a22e6d7dc0c42b668719fbc1e7c6751c1b95cca87444fa4a2eba016f9218269
                                    • Instruction Fuzzy Hash: D6424074A01228CFDB29EF34D954BA9B7B6FB48304F1041E9D909AB3A4DB359E85DF40
                                    APIs
                                    • RegCreateKeyExW.KERNELBASE(?,00000E24), ref: 04872CB9
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142672568.0000000004870000.00000040.00000800.00020000.00000000.sdmp, Offset: 04870000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4870000_server.jbxd
                                    Similarity
                                    • API ID: Create
                                    • String ID:
                                    • API String ID: 2289755597-0
                                    • Opcode ID: e0b808c0fa7177dd19e45a28d47bf51fff642865f4fe34daae0a5f8f15b52dcb
                                    • Instruction ID: 41694563d3536f860a781cdf6e009e6319f7cad2147a3b6c1491afc9c944171f
                                    • Opcode Fuzzy Hash: e0b808c0fa7177dd19e45a28d47bf51fff642865f4fe34daae0a5f8f15b52dcb
                                    • Instruction Fuzzy Hash: B8418175109380AFE7238B258C54F66BFB8EF56214F0849DAE985CB563D224E809CB71
                                    APIs
                                    • RegQueryValueExW.KERNELBASE(?,00000E24,?,?), ref: 048713E2
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142672568.0000000004870000.00000040.00000800.00020000.00000000.sdmp, Offset: 04870000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4870000_server.jbxd
                                    Similarity
                                    • API ID: QueryValue
                                    • String ID:
                                    • API String ID: 3660427363-0
                                    • Opcode ID: 88e91f13da743fc83fb01f39337bb614a9cdbd2040689eb9a48d01d3f139267b
                                    • Instruction ID: 18c8f5880b2f5c6b742631b2db17a79b54f26c1227e8c92c640e95b67f434531
                                    • Opcode Fuzzy Hash: 88e91f13da743fc83fb01f39337bb614a9cdbd2040689eb9a48d01d3f139267b
                                    • Instruction Fuzzy Hash: A9318B6510E3C06FD3138B258C65A61BFB4EF47610B0E45CBE8C48F6A3D229A909D7B2
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142647125.0000000004800000.00000040.00000800.00020000.00000000.sdmp, Offset: 04800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4800000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \Ok
                                    • API String ID: 0-3677890257
                                    • Opcode ID: 8e4339f9fc6a076d8cd9ff395c6f603571977456005acb16a4191ad81435676b
                                    • Instruction ID: beecd63dd4082a11fc6a29463d000dba0fe73c91084e0db7928f3c4e0491379e
                                    • Opcode Fuzzy Hash: 8e4339f9fc6a076d8cd9ff395c6f603571977456005acb16a4191ad81435676b
                                    • Instruction Fuzzy Hash: AF024E74A00228CFDB29EF34D854BA9B7B6BF49304F5041E9D909AB3A4DB359E85DF40
                                    APIs
                                    • GetProcessTimes.KERNELBASE(?,00000E24,8D865A99,00000000,00000000,00000000,00000000), ref: 04871EDD
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142672568.0000000004870000.00000040.00000800.00020000.00000000.sdmp, Offset: 04870000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4870000_server.jbxd
                                    Similarity
                                    • API ID: ProcessTimes
                                    • String ID:
                                    • API String ID: 1995159646-0
                                    • Opcode ID: af8413b7849e09495c265f598675890209a99252b1e5eb8f17deccb6164d10bf
                                    • Instruction ID: 603d70ce0b830a9e5a1c8e4c9abfe1329e7d6bde64150947bb5251822b73f4cf
                                    • Opcode Fuzzy Hash: af8413b7849e09495c265f598675890209a99252b1e5eb8f17deccb6164d10bf
                                    • Instruction Fuzzy Hash: FE31E5725047806FE722CF54DD55B96BFB8EF06310F08899AE984CB693D335A909CB71
                                    APIs
                                    • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32(?,00000E24), ref: 048718CB
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142672568.0000000004870000.00000040.00000800.00020000.00000000.sdmp, Offset: 04870000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4870000_server.jbxd
                                    Similarity
                                    • API ID: DescriptorSecurity$ConvertString
                                    • String ID:
                                    • API String ID: 3907675253-0
                                    • Opcode ID: 74dc86cb096802aa2d718f44bb2e3969294127a432ce4feb467c67c5adfde6e1
                                    • Instruction ID: a7dfe35799ee62ad6e360cd7f45873f001199274ddb3c52db100a904bab60aaa
                                    • Opcode Fuzzy Hash: 74dc86cb096802aa2d718f44bb2e3969294127a432ce4feb467c67c5adfde6e1
                                    • Instruction Fuzzy Hash: DF318F72604344AFE7228B65DC45FA6BBBCEF05210F0889AAE944DB652D234E949CB61
                                    APIs
                                    • GetExitCodeProcess.KERNELBASE(?,00000E24,8D865A99,00000000,00000000,00000000,00000000), ref: 04870F20
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142672568.0000000004870000.00000040.00000800.00020000.00000000.sdmp, Offset: 04870000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4870000_server.jbxd
                                    Similarity
                                    • API ID: CodeExitProcess
                                    • String ID:
                                    • API String ID: 3861947596-0
                                    • Opcode ID: 4b144e2b8af9c27bbf78f41b4468e047228950b0400ab82546531b77ce528696
                                    • Instruction ID: 38cfedb41db2835bc34299b2386b8b799dcfed38098ccb1c91caaa5342d4dbe1
                                    • Opcode Fuzzy Hash: 4b144e2b8af9c27bbf78f41b4468e047228950b0400ab82546531b77ce528696
                                    • Instruction Fuzzy Hash: FB21F6B25093806FE7128F64DC55B96BFB8EF07324F0884DAE944CF193D264A909CB71
                                    APIs
                                    • RegCreateKeyExW.KERNELBASE(?,00000E24), ref: 04872CB9
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142672568.0000000004870000.00000040.00000800.00020000.00000000.sdmp, Offset: 04870000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4870000_server.jbxd
                                    Similarity
                                    • API ID: Create
                                    • String ID:
                                    • API String ID: 2289755597-0
                                    • Opcode ID: 95ee330df42f1bf463fc3a1949afef9d63459879a43652a9992e6bdd6555f383
                                    • Instruction ID: e46b67bef8346bb1223de22129580974934d5dedd22bf4a4463bd2b0dd35042a
                                    • Opcode Fuzzy Hash: 95ee330df42f1bf463fc3a1949afef9d63459879a43652a9992e6bdd6555f383
                                    • Instruction Fuzzy Hash: 4021CE76600704AEE7318F19CD44FA7BBECEF18214F088A6AE945C7652E730E5088AB1
                                    APIs
                                    • GetProcessWorkingSetSize.KERNEL32(?,00000E24,8D865A99,00000000,00000000,00000000,00000000), ref: 04872FF7
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142672568.0000000004870000.00000040.00000800.00020000.00000000.sdmp, Offset: 04870000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4870000_server.jbxd
                                    Similarity
                                    • API ID: ProcessSizeWorking
                                    • String ID:
                                    • API String ID: 3584180929-0
                                    • Opcode ID: 0beb5769048c4d44681141a10c2bd8e21372a9768c0d91ac732c86fb559d6ff5
                                    • Instruction ID: f9e1d83ee7d9cfc09802e927e7e0a4e170c5727cdbe807818955d7eebd7781a6
                                    • Opcode Fuzzy Hash: 0beb5769048c4d44681141a10c2bd8e21372a9768c0d91ac732c86fb559d6ff5
                                    • Instruction Fuzzy Hash: BC21A5715097846FE713CB24DC55B96BFA8AF46214F0888DBE988CF293D235A909C772
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142672568.0000000004870000.00000040.00000800.00020000.00000000.sdmp, Offset: 04870000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4870000_server.jbxd
                                    Similarity
                                    • API ID: select
                                    • String ID:
                                    • API String ID: 1274211008-0
                                    • Opcode ID: 060626f5bfa630f69fbf8b44d4975d4a43e26111d7c8767d6e51a8dcb0090ed6
                                    • Instruction ID: 7da782b4d4938371131adbb019027a3787c16b95ef2cde25dddae9e38621492e
                                    • Opcode Fuzzy Hash: 060626f5bfa630f69fbf8b44d4975d4a43e26111d7c8767d6e51a8dcb0090ed6
                                    • Instruction Fuzzy Hash: 94215C755087809FD722CF25DC54A52BFF8EF06210B0889DAED88CB262D275E909DB61
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142672568.0000000004870000.00000040.00000800.00020000.00000000.sdmp, Offset: 04870000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4870000_server.jbxd
                                    Similarity
                                    • API ID: FileView
                                    • String ID:
                                    • API String ID: 3314676101-0
                                    • Opcode ID: b40dac2c66666f12d5edeed8e0cbfe02b5eb8ea5d0a1997d6c4b50b42e0569a3
                                    • Instruction ID: d56d29e025289ec95129676ba31b7ddf80a28d88efca95a9ab69d5fe241dcedc
                                    • Opcode Fuzzy Hash: b40dac2c66666f12d5edeed8e0cbfe02b5eb8ea5d0a1997d6c4b50b42e0569a3
                                    • Instruction Fuzzy Hash: 7E21B171404380AFE722CF59DD48F96FBF8EF09224F04899EE9858B652D375E548CB61
                                    APIs
                                    • WSASocketW.WS2_32(?,?,?,?,?), ref: 0487149A
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142672568.0000000004870000.00000040.00000800.00020000.00000000.sdmp, Offset: 04870000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4870000_server.jbxd
                                    Similarity
                                    • API ID: Socket
                                    • String ID:
                                    • API String ID: 38366605-0
                                    • Opcode ID: 8211825d0e1179be4209ddf49b5c193ea2e6b3a02af470c58167a80cff94b349
                                    • Instruction ID: d1419a30c1c6550cd2050c933ca359de96230986db9420041543b59fe583f749
                                    • Opcode Fuzzy Hash: 8211825d0e1179be4209ddf49b5c193ea2e6b3a02af470c58167a80cff94b349
                                    • Instruction Fuzzy Hash: DD21B171409380AFE722CF55DD49F96FFF8EF05220F08899EE9858B692D375A508CB61
                                    APIs
                                    • RegQueryValueExW.KERNELBASE(?,00000E24,8D865A99,00000000,00000000,00000000,00000000), ref: 048717E0
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142672568.0000000004870000.00000040.00000800.00020000.00000000.sdmp, Offset: 04870000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4870000_server.jbxd
                                    Similarity
                                    • API ID: QueryValue
                                    • String ID:
                                    • API String ID: 3660427363-0
                                    • Opcode ID: 6c36cc3ad66aa80ccbcd225359d7109e5ea440c49151a4dc5d1a270ea5a5fb61
                                    • Instruction ID: da730f10312307905c9bfc14238ab82e13ddacf083ba423d610932b820af2824
                                    • Opcode Fuzzy Hash: 6c36cc3ad66aa80ccbcd225359d7109e5ea440c49151a4dc5d1a270ea5a5fb61
                                    • Instruction Fuzzy Hash: 24219F72504740AFE722CF55DC48F66BBF8EF45710F08899AE9458B692D324E908CB61
                                    APIs
                                    • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32(?,00000E24), ref: 048718CB
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142672568.0000000004870000.00000040.00000800.00020000.00000000.sdmp, Offset: 04870000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4870000_server.jbxd
                                    Similarity
                                    • API ID: DescriptorSecurity$ConvertString
                                    • String ID:
                                    • API String ID: 3907675253-0
                                    • Opcode ID: d4a9706c8a7b42f981ab5c2610989afb0b348d6d9eb029ae3dbf7d6c2c3e8572
                                    • Instruction ID: 9b882806886f57e7483ac676e012b0e2ea7c9685d3f6608a2b5af46e3a6ff969
                                    • Opcode Fuzzy Hash: d4a9706c8a7b42f981ab5c2610989afb0b348d6d9eb029ae3dbf7d6c2c3e8572
                                    • Instruction Fuzzy Hash: 5C21DA71600204AFE721DF65DC45F6AF7ECEF04214F04896AE945DB741D734E5488A71
                                    APIs
                                    • SetProcessWorkingSetSize.KERNEL32(?,00000E24,8D865A99,00000000,00000000,00000000,00000000), ref: 048730DB
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142672568.0000000004870000.00000040.00000800.00020000.00000000.sdmp, Offset: 04870000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4870000_server.jbxd
                                    Similarity
                                    • API ID: ProcessSizeWorking
                                    • String ID:
                                    • API String ID: 3584180929-0
                                    • Opcode ID: 5d7fd87fb6b44fb8f0fdea774e1bd5d13daf1d7331db0f4dda5df4e22b17b349
                                    • Instruction ID: 60c92a70e5fc926b95855b1d2d8fa5a3baa38b62030efd2220ae93403c052b92
                                    • Opcode Fuzzy Hash: 5d7fd87fb6b44fb8f0fdea774e1bd5d13daf1d7331db0f4dda5df4e22b17b349
                                    • Instruction Fuzzy Hash: 1821D7715043806FD722CF55DC44FA7BFA8EF45210F0889AAF944DB252D274A908CBB1
                                    APIs
                                    • ioctlsocket.WS2_32(?,00000E24,8D865A99,00000000,00000000,00000000,00000000), ref: 04872E47
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142672568.0000000004870000.00000040.00000800.00020000.00000000.sdmp, Offset: 04870000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4870000_server.jbxd
                                    Similarity
                                    • API ID: ioctlsocket
                                    • String ID:
                                    • API String ID: 3577187118-0
                                    • Opcode ID: eca4e2abdfa4bb103481797366ec0114f90083bce275615a87c0533edd77191d
                                    • Instruction ID: 0defb2ba00bab442e2f044b3e28a6d080264d90fb821a8dc0a7ee2f488dcb68f
                                    • Opcode Fuzzy Hash: eca4e2abdfa4bb103481797366ec0114f90083bce275615a87c0533edd77191d
                                    • Instruction Fuzzy Hash: D621C6715093806FD722CF54DC84F96BFB8EF45210F08899AE9449F252C274A508C7B1
                                    APIs
                                    • WSAConnect.WS2_32(?,?,?,?,?,?,?), ref: 0487209A
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142672568.0000000004870000.00000040.00000800.00020000.00000000.sdmp, Offset: 04870000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4870000_server.jbxd
                                    Similarity
                                    • API ID: Connect
                                    • String ID:
                                    • API String ID: 3144859779-0
                                    • Opcode ID: 118a40c531ca9a2f9bd6f6d1221c9947d1a8f789bf5fdcb90dd0b9fd890d7273
                                    • Instruction ID: dd79584d556a5b513d96ff282ee080c2f30c49a1f476ecc415dc7636c26fe0a2
                                    • Opcode Fuzzy Hash: 118a40c531ca9a2f9bd6f6d1221c9947d1a8f789bf5fdcb90dd0b9fd890d7273
                                    • Instruction Fuzzy Hash: DA21B375009780AFDB228F60DC84A92BFF4EF06310F0989DAE9858F162D375A849DB71
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142672568.0000000004870000.00000040.00000800.00020000.00000000.sdmp, Offset: 04870000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4870000_server.jbxd
                                    Similarity
                                    • API ID: FileView
                                    • String ID:
                                    • API String ID: 3314676101-0
                                    • Opcode ID: 8895190afa03ace2754544070d4bfe289deb295a110551eee53a69f880fcb5b1
                                    • Instruction ID: 73c0ee4fa19139d247d5b4609830a2c77021521c0e9a7672fec2439ceb354767
                                    • Opcode Fuzzy Hash: 8895190afa03ace2754544070d4bfe289deb295a110551eee53a69f880fcb5b1
                                    • Instruction Fuzzy Hash: 6021C071500204AFE721CF59DD89FAAFBE8EF08224F048A69E9458BB51D375F548CBB1
                                    APIs
                                    • WSASocketW.WS2_32(?,?,?,?,?), ref: 0487149A
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142672568.0000000004870000.00000040.00000800.00020000.00000000.sdmp, Offset: 04870000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4870000_server.jbxd
                                    Similarity
                                    • API ID: Socket
                                    • String ID:
                                    • API String ID: 38366605-0
                                    • Opcode ID: 8dd99fa28b73d55aeb30dee75b60d5189f9919f59ee838706335b967423076d6
                                    • Instruction ID: 572c0a7df424433cf3fd45adeae60aecd4ddd221ce1d937bbc05db226c92a67a
                                    • Opcode Fuzzy Hash: 8dd99fa28b73d55aeb30dee75b60d5189f9919f59ee838706335b967423076d6
                                    • Instruction Fuzzy Hash: 4C21D471500200AFE731CF59DD45BA6FBE8EF08324F048969E9458AB52D375F408CBB1
                                    APIs
                                    • LoadLibraryA.KERNELBASE(?,00000E24), ref: 04872363
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142672568.0000000004870000.00000040.00000800.00020000.00000000.sdmp, Offset: 04870000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4870000_server.jbxd
                                    Similarity
                                    • API ID: LibraryLoad
                                    • String ID:
                                    • API String ID: 1029625771-0
                                    • Opcode ID: e34d2dbbc489978ad96e7716dd1cc6aecbf3c0f5959e1774f7dd6947929f3867
                                    • Instruction ID: 6a99c5a001293805fcbb51c9b42b53a9af6193fa615ba9eaf33b927685448ecd
                                    • Opcode Fuzzy Hash: e34d2dbbc489978ad96e7716dd1cc6aecbf3c0f5959e1774f7dd6947929f3867
                                    • Instruction Fuzzy Hash: E51106711043406FE721CB15DC85FA6FFB8DF06320F0484DAF9848F292D274A948CB62
                                    APIs
                                    • RegQueryValueExW.KERNELBASE(?,00000E24,8D865A99,00000000,00000000,00000000,00000000), ref: 048717E0
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142672568.0000000004870000.00000040.00000800.00020000.00000000.sdmp, Offset: 04870000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4870000_server.jbxd
                                    Similarity
                                    • API ID: QueryValue
                                    • String ID:
                                    • API String ID: 3660427363-0
                                    • Opcode ID: 38f65627c68f2149da022ac86386b83d73a3dc50fe4c884abfd66a15cce0f999
                                    • Instruction ID: 8e7279cb4b22e6a7aa5a6b9aa4e545503fb8600352d93c9a6d7b2a04a6dcc61d
                                    • Opcode Fuzzy Hash: 38f65627c68f2149da022ac86386b83d73a3dc50fe4c884abfd66a15cce0f999
                                    • Instruction Fuzzy Hash: 08119072600604AFE731CF55DD48BA6B7E8EF04614F048A6AE945CAB51D774E4088AB1
                                    APIs
                                    • GetProcessTimes.KERNELBASE(?,00000E24,8D865A99,00000000,00000000,00000000,00000000), ref: 04871EDD
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142672568.0000000004870000.00000040.00000800.00020000.00000000.sdmp, Offset: 04870000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4870000_server.jbxd
                                    Similarity
                                    • API ID: ProcessTimes
                                    • String ID:
                                    • API String ID: 1995159646-0
                                    • Opcode ID: ac66ae856de05d5bb894051796f4420078ff5cd3bf368d620f794d86d355c60f
                                    • Instruction ID: 129673fdeb4d99265faec21ea8f5e6f8dfee3a8b82273a45d1e58c88cbc3619c
                                    • Opcode Fuzzy Hash: ac66ae856de05d5bb894051796f4420078ff5cd3bf368d620f794d86d355c60f
                                    • Instruction Fuzzy Hash: 6A11D672500304AFE7218F55DD44BAAB7A8EF04314F04896AED45CBA51D775E5488BB1
                                    APIs
                                    • SetProcessWorkingSetSize.KERNEL32(?,00000E24,8D865A99,00000000,00000000,00000000,00000000), ref: 048730DB
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142672568.0000000004870000.00000040.00000800.00020000.00000000.sdmp, Offset: 04870000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4870000_server.jbxd
                                    Similarity
                                    • API ID: ProcessSizeWorking
                                    • String ID:
                                    • API String ID: 3584180929-0
                                    • Opcode ID: 17a67ec320fe1c35a69602b834a480fd56c0cc46266256b72753ed693af8ce70
                                    • Instruction ID: 0cbb8b0c8bc3c9f640e54fd90fb8fa73157b0515cbf3701b253950d09a8c37e3
                                    • Opcode Fuzzy Hash: 17a67ec320fe1c35a69602b834a480fd56c0cc46266256b72753ed693af8ce70
                                    • Instruction Fuzzy Hash: DB11B271600204AFEB21CF59DD45BAAB7A8EF04224F04896AED05DB641D775E948CAB2
                                    APIs
                                    • GetProcessWorkingSetSize.KERNEL32(?,00000E24,8D865A99,00000000,00000000,00000000,00000000), ref: 04872FF7
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142672568.0000000004870000.00000040.00000800.00020000.00000000.sdmp, Offset: 04870000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4870000_server.jbxd
                                    Similarity
                                    • API ID: ProcessSizeWorking
                                    • String ID:
                                    • API String ID: 3584180929-0
                                    • Opcode ID: 17a67ec320fe1c35a69602b834a480fd56c0cc46266256b72753ed693af8ce70
                                    • Instruction ID: 9b6a17c3500fca00c2a08b8cec27bf644c8ff11a375755bce59e44eb5b56581c
                                    • Opcode Fuzzy Hash: 17a67ec320fe1c35a69602b834a480fd56c0cc46266256b72753ed693af8ce70
                                    • Instruction Fuzzy Hash: 67110472600304AFE721CF59DD44BAAB7A8DF04224F0489AAED05CB641D775E908CAB1
                                    APIs
                                    • GetExitCodeProcess.KERNELBASE(?,00000E24,8D865A99,00000000,00000000,00000000,00000000), ref: 04870F20
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142672568.0000000004870000.00000040.00000800.00020000.00000000.sdmp, Offset: 04870000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4870000_server.jbxd
                                    Similarity
                                    • API ID: CodeExitProcess
                                    • String ID:
                                    • API String ID: 3861947596-0
                                    • Opcode ID: 948f8c858dc441f794eeaedbff7b4c895e0d6af99b6e22cca21660ea7877ffc6
                                    • Instruction ID: 00105af4270cecd4f4f3f2e0561d657a099f073f934030c806a20415a2fba49a
                                    • Opcode Fuzzy Hash: 948f8c858dc441f794eeaedbff7b4c895e0d6af99b6e22cca21660ea7877ffc6
                                    • Instruction Fuzzy Hash: 4E11E371600204AFEB21CF19DD85BAAB7A8DF05724F04C97AED05CB681D774E908CAB1
                                    APIs
                                    • ioctlsocket.WS2_32(?,00000E24,8D865A99,00000000,00000000,00000000,00000000), ref: 04872E47
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142672568.0000000004870000.00000040.00000800.00020000.00000000.sdmp, Offset: 04870000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4870000_server.jbxd
                                    Similarity
                                    • API ID: ioctlsocket
                                    • String ID:
                                    • API String ID: 3577187118-0
                                    • Opcode ID: b99725dbc7bfee0013da6036c54893c122fd001d27d30a3bf854d164a06c5df6
                                    • Instruction ID: 8b402aaf6e4ec701d11b438ece12fabbce1e187d1d197c2f0a46f499277dd21e
                                    • Opcode Fuzzy Hash: b99725dbc7bfee0013da6036c54893c122fd001d27d30a3bf854d164a06c5df6
                                    • Instruction Fuzzy Hash: E411E772500304AFE721CF54DD84BA6F7A8EF04324F1489A6ED45CB642D375E5088AB1
                                    APIs
                                    • LoadLibraryA.KERNELBASE(?,00000E24), ref: 04872363
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142672568.0000000004870000.00000040.00000800.00020000.00000000.sdmp, Offset: 04870000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4870000_server.jbxd
                                    Similarity
                                    • API ID: LibraryLoad
                                    • String ID:
                                    • API String ID: 1029625771-0
                                    • Opcode ID: 87eff6b1d2891cdbd07b9c8abf62a1678f81731614f769b37a23782410d13baf
                                    • Instruction ID: 9077d01c067b1bf2ef7aaa01de811485eaeca3ac70ffd1d9b085dfb7ea8d2f57
                                    • Opcode Fuzzy Hash: 87eff6b1d2891cdbd07b9c8abf62a1678f81731614f769b37a23782410d13baf
                                    • Instruction Fuzzy Hash: 89112571100304AEE720CB19DD85FB6FBA8DF04724F1489A9FD458A791D2B9F948CAA2
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142672568.0000000004870000.00000040.00000800.00020000.00000000.sdmp, Offset: 04870000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4870000_server.jbxd
                                    Similarity
                                    • API ID: select
                                    • String ID:
                                    • API String ID: 1274211008-0
                                    • Opcode ID: 0f84750d3c3bcfe24114d82d67809125b0547318ff4f7d5320b862fbee90fcb7
                                    • Instruction ID: 0135f7705153f7ad6e821c2e1b29b6a245ac9d3dda94cf022282ec766fcdf37f
                                    • Opcode Fuzzy Hash: 0f84750d3c3bcfe24114d82d67809125b0547318ff4f7d5320b862fbee90fcb7
                                    • Instruction Fuzzy Hash: 22116D756002049FDB30CF19D884B62F7E8EF04320F0889AAED49CB652D335E948CBA1
                                    APIs
                                    • WSAConnect.WS2_32(?,?,?,?,?,?,?), ref: 0487209A
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142672568.0000000004870000.00000040.00000800.00020000.00000000.sdmp, Offset: 04870000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4870000_server.jbxd
                                    Similarity
                                    • API ID: Connect
                                    • String ID:
                                    • API String ID: 3144859779-0
                                    • Opcode ID: 0a06293931b832bed2e6212cd56f90451c2b5a84c4d0a6951cf4d1714e79d16a
                                    • Instruction ID: dc0d3d1f0e47b652bc8b2091401a746c245133313f65932af423630c6be73b60
                                    • Opcode Fuzzy Hash: 0a06293931b832bed2e6212cd56f90451c2b5a84c4d0a6951cf4d1714e79d16a
                                    • Instruction Fuzzy Hash: B9115E755006049FDB20DF55D984B66FBE4EF08210F0889AAEE458B652D336E458DF72
                                    APIs
                                    • RegQueryValueExW.KERNELBASE(?,00000E24,?,?), ref: 048713E2
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142672568.0000000004870000.00000040.00000800.00020000.00000000.sdmp, Offset: 04870000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4870000_server.jbxd
                                    Similarity
                                    • API ID: QueryValue
                                    • String ID:
                                    • API String ID: 3660427363-0
                                    • Opcode ID: 4500b4e4b2e3c294c50851778003f1c01be923a82a48d294c3b6a945ccc1a13d
                                    • Instruction ID: 243ef92ecf68ddc5523b1201ffa0c377cb8d00b3ef6847c3d44719bfceb30f4e
                                    • Opcode Fuzzy Hash: 4500b4e4b2e3c294c50851778003f1c01be923a82a48d294c3b6a945ccc1a13d
                                    • Instruction Fuzzy Hash: 3301A771500201AFD250DF1ADD45F66FBE8FB88A20F148159EC085B742D771F515CBE5
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142647125.0000000004800000.00000040.00000800.00020000.00000000.sdmp, Offset: 04800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4800000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \Ok
                                    • API String ID: 0-3677890257
                                    • Opcode ID: f5fd9019b69aea13c1ff7093fd59b74fa440be710a674eb0632ec3c17af73600
                                    • Instruction ID: 71a5adcfef73f64212504385a52b85812ef4a170cf0b7b1118f42064e7a25319
                                    • Opcode Fuzzy Hash: f5fd9019b69aea13c1ff7093fd59b74fa440be710a674eb0632ec3c17af73600
                                    • Instruction Fuzzy Hash: 30D14C74A00228CFDB29EF34D894BADB7B6BB49304F5041E9D509AB3A4DB359E85DF40
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142647125.0000000004800000.00000040.00000800.00020000.00000000.sdmp, Offset: 04800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4800000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: K`
                                    • API String ID: 0-535225705
                                    • Opcode ID: df18527639de5ae37b1817dc69e53487f778aae1959aa45a3f4ba35c2223579a
                                    • Instruction ID: 9410d75c172a7781be4921b143a01e153eea3cc21ccf2c5143c6d0414abbf219
                                    • Opcode Fuzzy Hash: df18527639de5ae37b1817dc69e53487f778aae1959aa45a3f4ba35c2223579a
                                    • Instruction Fuzzy Hash: FBB17F70F002149FCB1DEF75E85095E77B2AF88248B608529E4169B3B9DF39AC46DB90
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142647125.0000000004800000.00000040.00000800.00020000.00000000.sdmp, Offset: 04800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4800000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 2k
                                    • API String ID: 0-1599061190
                                    • Opcode ID: 735e337ee51f85ac60204933f10a71bf6e80a2c82f47efe79765681eb70b7de3
                                    • Instruction ID: 5273e9b066f76cd026879f8441dad71d4e8b25a646ebfadc614aef51c2dbf2a6
                                    • Opcode Fuzzy Hash: 735e337ee51f85ac60204933f10a71bf6e80a2c82f47efe79765681eb70b7de3
                                    • Instruction Fuzzy Hash: E8815E30A00218CFDB28EFB4C855BEDB7B2AF45308F5085A9D505AB3A4DB795E85CF51
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142647125.0000000004800000.00000040.00000800.00020000.00000000.sdmp, Offset: 04800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4800000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 2k
                                    • API String ID: 0-1599061190
                                    • Opcode ID: 0f55cc068bd631b67385da2e907ab8cf9087c28bf873045055be18dbad2b7b24
                                    • Instruction ID: d7ebb5571cc8c53ff2796559d8a666e04ad83b384c3ed7eca86525aa09b58d41
                                    • Opcode Fuzzy Hash: 0f55cc068bd631b67385da2e907ab8cf9087c28bf873045055be18dbad2b7b24
                                    • Instruction Fuzzy Hash: 34416E30A00218CFDB28EFB5C955BEDB7B2BF44308F5045AAD405AB2A4DB795E85CF61
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142647125.0000000004800000.00000040.00000800.00020000.00000000.sdmp, Offset: 04800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4800000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 17d67561f914c99c45b7698108baa8d3ab2930cf6f804f0ca9919e9e4e31dbf6
                                    • Instruction ID: 18c34cf2b9fbf450da61e88e2b05cf7a50bd06f1566585467c83c640b0a33fd6
                                    • Opcode Fuzzy Hash: 17d67561f914c99c45b7698108baa8d3ab2930cf6f804f0ca9919e9e4e31dbf6
                                    • Instruction Fuzzy Hash: A7C2E374700164CFDB24AB29D904BB977F6AB4C304F40856B9849D77A8DB349E8AFF60
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142647125.0000000004800000.00000040.00000800.00020000.00000000.sdmp, Offset: 04800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4800000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8eab00c98529b73d21aa4efae2df34edb2301839ff3392e645088cd7004d33c3
                                    • Instruction ID: e170b597f8718446e6b102de0b87d463499c9cb77fd9e5a3fdf55f54aea407e0
                                    • Opcode Fuzzy Hash: 8eab00c98529b73d21aa4efae2df34edb2301839ff3392e645088cd7004d33c3
                                    • Instruction Fuzzy Hash: 1192C5707101648BDF256B29DD14BA937A7AB4D308F00846B9489D77E8CB389DD9FFA0
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142647125.0000000004800000.00000040.00000800.00020000.00000000.sdmp, Offset: 04800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4800000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8e095cc7efdf43b8daa138c10b0214c0340e43e62105a6ee6bf36e40d88f3ff1
                                    • Instruction ID: c38bf962dd1a4e7cc31818e8b97ea7140891257fe6289448f2078188909d62ba
                                    • Opcode Fuzzy Hash: 8e095cc7efdf43b8daa138c10b0214c0340e43e62105a6ee6bf36e40d88f3ff1
                                    • Instruction Fuzzy Hash: 8C92C5707101648BDF256B29DD14BA937E7AB4D308F00846B9489D77A8CB389DD9FFA0
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142647125.0000000004800000.00000040.00000800.00020000.00000000.sdmp, Offset: 04800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4800000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 94aac4779161f3fc2a10947c1c9367f60fdfffee2ea802f7b2f0a750a41a384f
                                    • Instruction ID: 1df9e2cca9f5b3f40761f0436ec2d532909a18b98e7b189f2bc0f688a5aefda5
                                    • Opcode Fuzzy Hash: 94aac4779161f3fc2a10947c1c9367f60fdfffee2ea802f7b2f0a750a41a384f
                                    • Instruction Fuzzy Hash: 6CD18270F00214DFCB0DEFB5E85195D77B6AF48248B608529E4129B3B9DF39AC46DB90
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142647125.0000000004800000.00000040.00000800.00020000.00000000.sdmp, Offset: 04800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4800000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b58d51e26a0b924496ef1fd35a41f7e347646078d7fea368cfdf3ba416887e23
                                    • Instruction ID: 08b1481e7b64a09053f2d66c3eedb5fd5b1c41fb58ba7e958630eb9c8b8e57da
                                    • Opcode Fuzzy Hash: b58d51e26a0b924496ef1fd35a41f7e347646078d7fea368cfdf3ba416887e23
                                    • Instruction Fuzzy Hash: 2F917F74F00214DFCB0DAFB5E85195D73B2AF88248B608529E4129B3B8DF39AC56DF90
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142647125.0000000004800000.00000040.00000800.00020000.00000000.sdmp, Offset: 04800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4800000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9f9deb386cc21b41f6ed5f6f53f0f97c5d09018e57721209d8b4d32865bbae13
                                    • Instruction ID: 2f32bbf49f7988beb7a6005e6c0be5ac999c032cfd461026a744b0ddd2ea1c3b
                                    • Opcode Fuzzy Hash: 9f9deb386cc21b41f6ed5f6f53f0f97c5d09018e57721209d8b4d32865bbae13
                                    • Instruction Fuzzy Hash: B8918E74F00214DFCB0DAF75E85195D73B2AF88308B608529E4129B3B8DF39AC56EB90
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142647125.0000000004800000.00000040.00000800.00020000.00000000.sdmp, Offset: 04800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4800000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d865f6bebcb15722b83fc486e4afb24d0d535e388a6c53342e332e61fb819a8e
                                    • Instruction ID: d0da7963b48bcec1aea21a75ca76d67918cb7b62c7b5a821fb62b08325b08591
                                    • Opcode Fuzzy Hash: d865f6bebcb15722b83fc486e4afb24d0d535e388a6c53342e332e61fb819a8e
                                    • Instruction Fuzzy Hash: EE818E74B00214DFCB1DAF75E85196D73B2AF88308B608529E4159B3B8DF39AC56EF90
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142647125.0000000004800000.00000040.00000800.00020000.00000000.sdmp, Offset: 04800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4800000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 1b9c540e17a62046f886d1bb34e6679a849d477d24d17d23674327648cd24cb3
                                    • Instruction ID: 6dd978216dcef09b83eba167d885aed24c8e607fdeecd94f22cb47bc1a5002b2
                                    • Opcode Fuzzy Hash: 1b9c540e17a62046f886d1bb34e6679a849d477d24d17d23674327648cd24cb3
                                    • Instruction Fuzzy Hash: CDA1E874A00228CFCB29EF74D985AECB7B2FB48308F5045A9D9099B364DB355E86DF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142647125.0000000004800000.00000040.00000800.00020000.00000000.sdmp, Offset: 04800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4800000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5043dc3e9dbd3672220f8ae0663bf1c511bbe7fbd1cf973956499b6bfdc60849
                                    • Instruction ID: 2b522be1a58ba66ed39072f2162321cd18260ad8951136ecd51ed0c24fbdcd0d
                                    • Opcode Fuzzy Hash: 5043dc3e9dbd3672220f8ae0663bf1c511bbe7fbd1cf973956499b6bfdc60849
                                    • Instruction Fuzzy Hash: 9241D3307106118FDB68BB35DC017A932A6AF84354F58CA64D451DB2E5EF38EA86DB60
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142647125.0000000004800000.00000040.00000800.00020000.00000000.sdmp, Offset: 04800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4800000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ca660bd3064c18cccf87fb5fe75067e23742e621317a14e84213e9601f18b0aa
                                    • Instruction ID: 04a80f75fdd96b8eba7f0f310a19e73586585eafc7db56b5bb422e199b573f4e
                                    • Opcode Fuzzy Hash: ca660bd3064c18cccf87fb5fe75067e23742e621317a14e84213e9601f18b0aa
                                    • Instruction Fuzzy Hash: 1231C630B002114FC754BB78D811BAE33AA9B89218F50883AD505DB7E9DF7CAD4AD7D1
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142647125.0000000004800000.00000040.00000800.00020000.00000000.sdmp, Offset: 04800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4800000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7a3be9fc37ec578a0b23238e60a4ee519f332fb5c6fa91aa22bbd7b631a2ed24
                                    • Instruction ID: b0b7d1463fe9ca5ae80e0792b2193dfe0bc44da5d406c5a443fc387edc556182
                                    • Opcode Fuzzy Hash: 7a3be9fc37ec578a0b23238e60a4ee519f332fb5c6fa91aa22bbd7b631a2ed24
                                    • Instruction Fuzzy Hash: 5D31D334B102059FDB18CF39D858BAEBBF6AF88204F148539E405EB7E1DB74A9058B91
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142647125.0000000004800000.00000040.00000800.00020000.00000000.sdmp, Offset: 04800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4800000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 12ec97ef569397a842e7d83fe6a00a6b583b1c1d4ab47178ef09f770866602c8
                                    • Instruction ID: fbf31898b9f29e3803cf5399ffd988af05b2f4c8baff71718521a43c295154e8
                                    • Opcode Fuzzy Hash: 12ec97ef569397a842e7d83fe6a00a6b583b1c1d4ab47178ef09f770866602c8
                                    • Instruction Fuzzy Hash: 7F11B3A584E7C04FD3139334AC25B513FB45B17209F4E45DBC480CE1E7D6AC590AD762
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142647125.0000000004800000.00000040.00000800.00020000.00000000.sdmp, Offset: 04800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4800000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5451a3bf6683748a7409ac0eb936114bbeee82f0051f5157a60fc6917864ebf6
                                    • Instruction ID: ae1500a585906c5801848257a0a05e8470c87f7676df5a8a9835771b6cb34d2a
                                    • Opcode Fuzzy Hash: 5451a3bf6683748a7409ac0eb936114bbeee82f0051f5157a60fc6917864ebf6
                                    • Instruction Fuzzy Hash: E9F0C231A00304ABEB08EFB0DC02B6E7BB6EF82624F1086AEE145DB1D1DA765841C780
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142647125.0000000004800000.00000040.00000800.00020000.00000000.sdmp, Offset: 04800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4800000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0bab07e25082e1a1550d557c5518b8f0c56c3f11191e502b1a56e68757b265f5
                                    • Instruction ID: 159822c1a4c88e03dde452bd92714afe31fbbe5892fb49d1abc61329697edae3
                                    • Opcode Fuzzy Hash: 0bab07e25082e1a1550d557c5518b8f0c56c3f11191e502b1a56e68757b265f5
                                    • Instruction Fuzzy Hash: E1E0CD7050E3445FCB469BB46C560FC7FB48A1311070046E7D845C3593D8651D868343
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142647125.0000000004800000.00000040.00000800.00020000.00000000.sdmp, Offset: 04800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4800000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2df31303fc8397cda169255e454ecae18353d2f0b02f8b00ff0beb2e9a736ac4
                                    • Instruction ID: 1af68f7b0614a822b0aa75a87a14afcbc74809817019392c8c7d40e14199f2ca
                                    • Opcode Fuzzy Hash: 2df31303fc8397cda169255e454ecae18353d2f0b02f8b00ff0beb2e9a736ac4
                                    • Instruction Fuzzy Hash: 2DE08670A5A2849FCB41CF78AD118D97FF49B1321470141DBD445D76A2EA711E09CB12
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142647125.0000000004800000.00000040.00000800.00020000.00000000.sdmp, Offset: 04800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4800000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ae3e6c2549cbacb65bc8fb0ec1bed2ff30438cf3d9f04f0b0c4021636b90f6d0
                                    • Instruction ID: e9d1df8226c1e384946f8fe0a38409cc5c3af319d0fe66226a85e3b0c778ee3d
                                    • Opcode Fuzzy Hash: ae3e6c2549cbacb65bc8fb0ec1bed2ff30438cf3d9f04f0b0c4021636b90f6d0
                                    • Instruction Fuzzy Hash: 36E012342193948FC71A277894288293FB6AF8710935908FFD5894B266DF3AD442CB51
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4139859566.00000000005F2000.00000040.00000800.00020000.00000000.sdmp, Offset: 005F2000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5f2000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ff95c5f9c6fc36238700698eb9b01726c32dbe9d5523951b0a8d082863542586
                                    • Instruction ID: 7b472b42a87cd6ae24875edb92e658df286feb550c0a5cdf743cdb6f4ee605c6
                                    • Opcode Fuzzy Hash: ff95c5f9c6fc36238700698eb9b01726c32dbe9d5523951b0a8d082863542586
                                    • Instruction Fuzzy Hash: 49D02EB92006C04FD7238A0CC2A8FA53BD4BB40708F4A04FAA800CB763C7ACD880C200
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4139859566.00000000005F2000.00000040.00000800.00020000.00000000.sdmp, Offset: 005F2000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5f2000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: aaaae0fa311ad4c86f859423541cf0c72a3bc5d13c222dab4552ca4420fbc387
                                    • Instruction ID: 380c36a2314e3a6a892535ccbcae8bdb4fd1b2fc90d4930acf3c73cb152d917b
                                    • Opcode Fuzzy Hash: aaaae0fa311ad4c86f859423541cf0c72a3bc5d13c222dab4552ca4420fbc387
                                    • Instruction Fuzzy Hash: 66D05EB42006854FC725DA0CC2D4F693BD4BF40714F0648E8AC108B7A6C7ACD8C4DA00
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4142647125.0000000004800000.00000040.00000800.00020000.00000000.sdmp, Offset: 04800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4800000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: bea90b9626cc5bbcb5a260b43ece43e6eb9405b80655b87a7ca4c5b4e7068a24
                                    • Instruction ID: 0da392dcd333ee26bba9c71b9425549e57eeb1cc7eca049a3fdca91428b79237
                                    • Opcode Fuzzy Hash: bea90b9626cc5bbcb5a260b43ece43e6eb9405b80655b87a7ca4c5b4e7068a24
                                    • Instruction Fuzzy Hash: D6D0C971A15208EF8B44EFA8DD4589EB7F9EB46215B1041AAA809D3750EE325E04DB81