Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
gReXLT7XjR.exe

Overview

General Information

Sample name:gReXLT7XjR.exe
renamed because original name is a hash value
Original sample name:4951d592fac59ef8005596d2af5d116b.exe
Analysis ID:1580723
MD5:4951d592fac59ef8005596d2af5d116b
SHA1:536ab7195afefb6c8947a86b10adb8d0461f7115
SHA256:ef022f571bbe78532cc1d1d09689470933f629f5e3775929f8926d7b51e6f122
Tags:exenjratRATuser-abuse_ch
Infos:

Detection

Njrat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Njrat
.NET source code contains potential unpacker
AI detected suspicious sample
Connects to many ports of the same IP (likely port scanning)
Contains functionality to disable the Task Manager (.Net Source)
Contains functionality to spread to USB devices (.Net source)
Disables the Windows task manager (taskmgr)
Disables zone checking for all users
Drops PE files to the startup folder
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies the windows firewall
Uses netsh to modify the Windows network and firewall settings
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to call native functions
Contains functionality to detect virtual machines (SLDT)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates a window with clipboard capturing capabilities
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May infect USB drives
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Startup Folder File Write
Stores files to the Windows start menu directory
Uses 32bit PE files
Yara signature match

Classification

  • System is w10x64
  • gReXLT7XjR.exe (PID: 7496 cmdline: "C:\Users\user\Desktop\gReXLT7XjR.exe" MD5: 4951D592FAC59EF8005596D2AF5D116B)
    • server.exe (PID: 7564 cmdline: "C:\Windows\server.exe" MD5: 4951D592FAC59EF8005596D2AF5D116B)
      • netsh.exe (PID: 7636 cmdline: netsh firewall add allowedprogram "C:\Windows\server.exe" "server.exe" ENABLE MD5: 4E89A1A088BE715D6C946E55AB07C7DF)
        • conhost.exe (PID: 7644 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • netsh.exe (PID: 7724 cmdline: netsh firewall delete allowedprogram "C:\Windows\server.exe" MD5: 4E89A1A088BE715D6C946E55AB07C7DF)
        • conhost.exe (PID: 7744 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • netsh.exe (PID: 7732 cmdline: netsh firewall add allowedprogram "C:\Windows\server.exe" "server.exe" ENABLE MD5: 4E89A1A088BE715D6C946E55AB07C7DF)
        • conhost.exe (PID: 7752 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • DeadMom.exe (PID: 8152 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exe" MD5: 4951D592FAC59EF8005596D2AF5D116B)
  • Microsoft Corporation.exe (PID: 4544 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe" MD5: 4951D592FAC59EF8005596D2AF5D116B)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
NjRATRedPacket Security describes NJRat as "a remote access trojan (RAT) has capabilities to log keystrokes, access the victim's camera, steal credentials stored in browsers, open a reverse shell, upload/download files, view the victim's desktop, perform process, file, and registry manipulations, and capabilities to let the attacker update, uninstall, restart, close, disconnect the RAT and rename its campaign ID. Through the Command & Control (CnC) server software, the attacker has capabilities to create and configure the malware to spread through USB drives."It is supposedly popular with actors in the Middle East. Similar to other RATs, many leaked builders may be backdoored.
  • AQUATIC PANDA
  • Earth Lusca
  • Operation C-Major
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.njrat
{"Campaign ID": "HacKed", "Version": "0.7d", "Install Name": "445c7762b8f06a76352fcac2e22df159", "Install Dir": "Kaspersky Anti-Virus Flash", "Registry Value": "Software\\Microsoft\\Windows\\CurrentVersion\\Run", "Network Seprator": "|'|'|"}
SourceRuleDescriptionAuthorStrings
gReXLT7XjR.exeJoeSecurity_NjratYara detected NjratJoe Security
    gReXLT7XjR.exeWindows_Trojan_Njrat_30f3c220unknownunknown
    • 0x115d2:$a1: get_Registry
    • 0x15a79:$a2: SEE_MASK_NOZONECHECKS
    • 0x1571b:$a3: Download ERROR
    • 0x15ccb:$a4: cmd.exe /c ping 0 -n 2 & del "
    • 0x13c58:$a5: netsh firewall delete allowedprogram "
    gReXLT7XjR.exeCN_disclosed_20180208_cDetects malware from disclosed CN malware setFlorian Roth
    • 0x15ccb:$x1: cmd.exe /c ping 0 -n 2 & del "
    • 0x137e4:$s1: winmgmts:\\.\root\SecurityCenter2
    • 0x15739:$s3: Executed As
    • 0x124f0:$s5: Stub.exe
    • 0x1571b:$s6: Download ERROR
    • 0x137a6:$s8: Select * From AntiVirusProduct
    gReXLT7XjR.execrimeware_njrat_stringsDetects njRAT based on some stringsSekoia.io
    • 0x154bd:$: set cdaudio door closed
    • 0x15481:$: set cdaudio door open
    • 0x15ce1:$: ping 0
    • 0x13412:$: [endof]
    • 0x132cc:$: TiGeR-Firewall
    • 0x132fa:$: NetSnifferCs
    • 0x132b8:$: IPBlocker
    • 0x13314:$: Sandboxie Control
    gReXLT7XjR.exeNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
    • 0x15a79:$reg: SEE_MASK_NOZONECHECKS
    • 0x156ff:$msg: Execute ERROR
    • 0x15753:$msg: Execute ERROR
    • 0x15ccb:$ping: cmd.exe /c ping 0 -n 2 & del
    Click to see the 1 entries
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeJoeSecurity_NjratYara detected NjratJoe Security
      C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeWindows_Trojan_Njrat_30f3c220unknownunknown
      • 0x115d2:$a1: get_Registry
      • 0x15a79:$a2: SEE_MASK_NOZONECHECKS
      • 0x1571b:$a3: Download ERROR
      • 0x15ccb:$a4: cmd.exe /c ping 0 -n 2 & del "
      • 0x13c58:$a5: netsh firewall delete allowedprogram "
      C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeCN_disclosed_20180208_cDetects malware from disclosed CN malware setFlorian Roth
      • 0x15ccb:$x1: cmd.exe /c ping 0 -n 2 & del "
      • 0x137e4:$s1: winmgmts:\\.\root\SecurityCenter2
      • 0x15739:$s3: Executed As
      • 0x124f0:$s5: Stub.exe
      • 0x1571b:$s6: Download ERROR
      • 0x137a6:$s8: Select * From AntiVirusProduct
      C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.execrimeware_njrat_stringsDetects njRAT based on some stringsSekoia.io
      • 0x154bd:$: set cdaudio door closed
      • 0x15481:$: set cdaudio door open
      • 0x15ce1:$: ping 0
      • 0x13412:$: [endof]
      • 0x132cc:$: TiGeR-Firewall
      • 0x132fa:$: NetSnifferCs
      • 0x132b8:$: IPBlocker
      • 0x13314:$: Sandboxie Control
      C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
      • 0x15a79:$reg: SEE_MASK_NOZONECHECKS
      • 0x156ff:$msg: Execute ERROR
      • 0x15753:$msg: Execute ERROR
      • 0x15ccb:$ping: cmd.exe /c ping 0 -n 2 & del
      Click to see the 61 entries
      SourceRuleDescriptionAuthorStrings
      00000000.00000002.1679600607.0000000003B08000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_NjratYara detected NjratJoe Security
        00000000.00000002.1679600607.0000000003B08000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Njrat_30f3c220unknownunknown
        • 0x115f2:$a1: get_Registry
        • 0x15a99:$a2: SEE_MASK_NOZONECHECKS
        • 0x1573b:$a3: Download ERROR
        • 0x15ceb:$a4: cmd.exe /c ping 0 -n 2 & del "
        • 0x13c78:$a5: netsh firewall delete allowedprogram "
        00000000.00000002.1679600607.0000000003B08000.00000004.00000800.00020000.00000000.sdmpNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
        • 0x15a99:$reg: SEE_MASK_NOZONECHECKS
        • 0x1571f:$msg: Execute ERROR
        • 0x15773:$msg: Execute ERROR
        • 0x15ceb:$ping: cmd.exe /c ping 0 -n 2 & del
        00000000.00000000.1661776984.0000000000512000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_NjratYara detected NjratJoe Security
          00000000.00000000.1661776984.0000000000512000.00000002.00000001.01000000.00000003.sdmpWindows_Trojan_Njrat_30f3c220unknownunknown
          • 0x113d2:$a1: get_Registry
          • 0x15879:$a2: SEE_MASK_NOZONECHECKS
          • 0x1551b:$a3: Download ERROR
          • 0x15acb:$a4: cmd.exe /c ping 0 -n 2 & del "
          • 0x13a58:$a5: netsh firewall delete allowedprogram "
          Click to see the 7 entries
          SourceRuleDescriptionAuthorStrings
          0.0.gReXLT7XjR.exe.510000.0.unpackJoeSecurity_NjratYara detected NjratJoe Security
            0.0.gReXLT7XjR.exe.510000.0.unpackWindows_Trojan_Njrat_30f3c220unknownunknown
            • 0x115d2:$a1: get_Registry
            • 0x15a79:$a2: SEE_MASK_NOZONECHECKS
            • 0x1571b:$a3: Download ERROR
            • 0x15ccb:$a4: cmd.exe /c ping 0 -n 2 & del "
            • 0x13c58:$a5: netsh firewall delete allowedprogram "
            0.0.gReXLT7XjR.exe.510000.0.unpackCN_disclosed_20180208_cDetects malware from disclosed CN malware setFlorian Roth
            • 0x15ccb:$x1: cmd.exe /c ping 0 -n 2 & del "
            • 0x137e4:$s1: winmgmts:\\.\root\SecurityCenter2
            • 0x15739:$s3: Executed As
            • 0x124f0:$s5: Stub.exe
            • 0x1571b:$s6: Download ERROR
            • 0x137a6:$s8: Select * From AntiVirusProduct
            0.0.gReXLT7XjR.exe.510000.0.unpackcrimeware_njrat_stringsDetects njRAT based on some stringsSekoia.io
            • 0x154bd:$: set cdaudio door closed
            • 0x15481:$: set cdaudio door open
            • 0x15ce1:$: ping 0
            • 0x13412:$: [endof]
            • 0x132cc:$: TiGeR-Firewall
            • 0x132fa:$: NetSnifferCs
            • 0x132b8:$: IPBlocker
            • 0x13314:$: Sandboxie Control
            0.0.gReXLT7XjR.exe.510000.0.unpackNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
            • 0x15a79:$reg: SEE_MASK_NOZONECHECKS
            • 0x156ff:$msg: Execute ERROR
            • 0x15753:$msg: Execute ERROR
            • 0x15ccb:$ping: cmd.exe /c ping 0 -n 2 & del
            Click to see the 1 entries

            System Summary

            barindex
            Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Windows\server.exe, ProcessId: 7564, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-25T19:27:01.311411+010020211761Malware Command and Control Activity Detected192.168.2.449730147.185.221.1842876TCP
            2024-12-25T19:27:04.782030+010020211761Malware Command and Control Activity Detected192.168.2.449731147.185.221.1842876TCP
            2024-12-25T19:27:08.629357+010020211761Malware Command and Control Activity Detected192.168.2.449732147.185.221.1842876TCP
            2024-12-25T19:27:12.521222+010020211761Malware Command and Control Activity Detected192.168.2.449733147.185.221.1842876TCP
            2024-12-25T19:27:16.605337+010020211761Malware Command and Control Activity Detected192.168.2.449736147.185.221.1842876TCP
            2024-12-25T19:27:20.441669+010020211761Malware Command and Control Activity Detected192.168.2.449740147.185.221.1842876TCP
            2024-12-25T19:27:24.279456+010020211761Malware Command and Control Activity Detected192.168.2.449742147.185.221.1842876TCP
            2024-12-25T19:27:28.109295+010020211761Malware Command and Control Activity Detected192.168.2.449743147.185.221.1842876TCP
            2024-12-25T19:27:31.985928+010020211761Malware Command and Control Activity Detected192.168.2.449744147.185.221.1842876TCP
            2024-12-25T19:27:35.816452+010020211761Malware Command and Control Activity Detected192.168.2.449745147.185.221.1842876TCP
            2024-12-25T19:27:39.671891+010020211761Malware Command and Control Activity Detected192.168.2.449746147.185.221.1842876TCP
            2024-12-25T19:27:43.502795+010020211761Malware Command and Control Activity Detected192.168.2.449747147.185.221.1842876TCP
            2024-12-25T19:27:47.381066+010020211761Malware Command and Control Activity Detected192.168.2.449748147.185.221.1842876TCP
            2024-12-25T19:27:51.416703+010020211761Malware Command and Control Activity Detected192.168.2.449749147.185.221.1842876TCP
            2024-12-25T19:27:55.256662+010020211761Malware Command and Control Activity Detected192.168.2.449751147.185.221.1842876TCP
            2024-12-25T19:27:59.110643+010020211761Malware Command and Control Activity Detected192.168.2.449763147.185.221.1842876TCP
            2024-12-25T19:28:02.984793+010020211761Malware Command and Control Activity Detected192.168.2.449769147.185.221.1842876TCP
            2024-12-25T19:28:06.673988+010020211761Malware Command and Control Activity Detected192.168.2.449779147.185.221.1842876TCP
            2024-12-25T19:28:10.290338+010020211761Malware Command and Control Activity Detected192.168.2.449789147.185.221.1842876TCP
            2024-12-25T19:28:13.798520+010020211761Malware Command and Control Activity Detected192.168.2.449796147.185.221.1842876TCP
            2024-12-25T19:28:17.435879+010020211761Malware Command and Control Activity Detected192.168.2.449806147.185.221.1842876TCP
            2024-12-25T19:28:20.742541+010020211761Malware Command and Control Activity Detected192.168.2.449813147.185.221.1842876TCP
            2024-12-25T19:28:23.895442+010020211761Malware Command and Control Activity Detected192.168.2.449823147.185.221.1842876TCP
            2024-12-25T19:28:27.015106+010020211761Malware Command and Control Activity Detected192.168.2.449830147.185.221.1842876TCP
            2024-12-25T19:28:30.031254+010020211761Malware Command and Control Activity Detected192.168.2.449836147.185.221.1842876TCP
            2024-12-25T19:28:56.960211+010020211761Malware Command and Control Activity Detected192.168.2.449893147.185.221.1842876TCP
            2024-12-25T19:28:59.828732+010020211761Malware Command and Control Activity Detected192.168.2.449902147.185.221.1842876TCP
            2024-12-25T19:29:02.596571+010020211761Malware Command and Control Activity Detected192.168.2.449909147.185.221.1842876TCP
            2024-12-25T19:29:05.380948+010020211761Malware Command and Control Activity Detected192.168.2.449915147.185.221.1842876TCP
            2024-12-25T19:29:08.464794+010020211761Malware Command and Control Activity Detected192.168.2.449921147.185.221.1842876TCP
            2024-12-25T19:29:11.059281+010020211761Malware Command and Control Activity Detected192.168.2.449927147.185.221.1842876TCP
            2024-12-25T19:29:13.563423+010020211761Malware Command and Control Activity Detected192.168.2.449933147.185.221.1842876TCP
            2024-12-25T19:29:16.067195+010020211761Malware Command and Control Activity Detected192.168.2.449940147.185.221.1842876TCP
            2024-12-25T19:29:18.553373+010020211761Malware Command and Control Activity Detected192.168.2.449947147.185.221.1842876TCP
            2024-12-25T19:29:21.005336+010020211761Malware Command and Control Activity Detected192.168.2.449954147.185.221.1842876TCP
            2024-12-25T19:29:23.394832+010020211761Malware Command and Control Activity Detected192.168.2.449960147.185.221.1842876TCP
            2024-12-25T19:29:25.827890+010020211761Malware Command and Control Activity Detected192.168.2.449966147.185.221.1842876TCP
            2024-12-25T19:29:28.796450+010020211761Malware Command and Control Activity Detected192.168.2.449972147.185.221.1842876TCP
            2024-12-25T19:29:31.016652+010020211761Malware Command and Control Activity Detected192.168.2.449977147.185.221.1842876TCP
            2024-12-25T19:29:33.308343+010020211761Malware Command and Control Activity Detected192.168.2.449983147.185.221.1842876TCP
            2024-12-25T19:29:35.532168+010020211761Malware Command and Control Activity Detected192.168.2.449989147.185.221.1842876TCP
            2024-12-25T19:29:37.713030+010020211761Malware Command and Control Activity Detected192.168.2.449995147.185.221.1842876TCP
            2024-12-25T19:29:39.891898+010020211761Malware Command and Control Activity Detected192.168.2.450001147.185.221.1842876TCP
            2024-12-25T19:29:42.069274+010020211761Malware Command and Control Activity Detected192.168.2.450007147.185.221.1842876TCP
            2024-12-25T19:29:44.227018+010020211761Malware Command and Control Activity Detected192.168.2.450013147.185.221.1842876TCP
            2024-12-25T19:29:46.487974+010020211761Malware Command and Control Activity Detected192.168.2.450019147.185.221.1842876TCP
            2024-12-25T19:29:48.630910+010020211761Malware Command and Control Activity Detected192.168.2.450024147.185.221.1842876TCP
            2024-12-25T19:29:50.710170+010020211761Malware Command and Control Activity Detected192.168.2.450030147.185.221.1842876TCP
            2024-12-25T19:29:52.763223+010020211761Malware Command and Control Activity Detected192.168.2.450036147.185.221.1842876TCP
            2024-12-25T19:29:54.859952+010020211761Malware Command and Control Activity Detected192.168.2.450040147.185.221.1842876TCP
            2024-12-25T19:29:56.943978+010020211761Malware Command and Control Activity Detected192.168.2.450046147.185.221.1842876TCP
            2024-12-25T19:29:59.035178+010020211761Malware Command and Control Activity Detected192.168.2.450051147.185.221.1842876TCP
            2024-12-25T19:30:01.060620+010020211761Malware Command and Control Activity Detected192.168.2.450054147.185.221.1842876TCP
            2024-12-25T19:30:03.136417+010020211761Malware Command and Control Activity Detected192.168.2.450055147.185.221.1842876TCP
            2024-12-25T19:30:05.144405+010020211761Malware Command and Control Activity Detected192.168.2.450056147.185.221.1842876TCP
            2024-12-25T19:30:07.114444+010020211761Malware Command and Control Activity Detected192.168.2.450057147.185.221.1842876TCP
            2024-12-25T19:30:09.158428+010020211761Malware Command and Control Activity Detected192.168.2.450058147.185.221.1842876TCP
            2024-12-25T19:30:11.116363+010020211761Malware Command and Control Activity Detected192.168.2.450059147.185.221.1842876TCP
            2024-12-25T19:30:13.048197+010020211761Malware Command and Control Activity Detected192.168.2.450060147.185.221.1842876TCP
            2024-12-25T19:30:15.023097+010020211761Malware Command and Control Activity Detected192.168.2.450061147.185.221.1842876TCP
            2024-12-25T19:30:17.017306+010020211761Malware Command and Control Activity Detected192.168.2.450062147.185.221.1842876TCP
            2024-12-25T19:30:18.970100+010020211761Malware Command and Control Activity Detected192.168.2.450063147.185.221.1842876TCP
            2024-12-25T19:30:21.064635+010020211761Malware Command and Control Activity Detected192.168.2.450064147.185.221.1842876TCP
            2024-12-25T19:30:23.067903+010020211761Malware Command and Control Activity Detected192.168.2.450065147.185.221.1842876TCP
            2024-12-25T19:30:24.909726+010020211761Malware Command and Control Activity Detected192.168.2.450066147.185.221.1842876TCP
            2024-12-25T19:30:26.800683+010020211761Malware Command and Control Activity Detected192.168.2.450067147.185.221.1842876TCP
            2024-12-25T19:30:28.697052+010020211761Malware Command and Control Activity Detected192.168.2.450068147.185.221.1842876TCP
            2024-12-25T19:30:30.621315+010020211761Malware Command and Control Activity Detected192.168.2.450069147.185.221.1842876TCP
            2024-12-25T19:30:32.505468+010020211761Malware Command and Control Activity Detected192.168.2.450070147.185.221.1842876TCP
            2024-12-25T19:30:34.395945+010020211761Malware Command and Control Activity Detected192.168.2.450071147.185.221.1842876TCP
            2024-12-25T19:30:36.284419+010020211761Malware Command and Control Activity Detected192.168.2.450072147.185.221.1842876TCP
            2024-12-25T19:30:38.189590+010020211761Malware Command and Control Activity Detected192.168.2.450073147.185.221.1842876TCP
            2024-12-25T19:30:40.087676+010020211761Malware Command and Control Activity Detected192.168.2.450074147.185.221.1842876TCP
            2024-12-25T19:30:42.007971+010020211761Malware Command and Control Activity Detected192.168.2.450075147.185.221.1842876TCP
            2024-12-25T19:30:43.888278+010020211761Malware Command and Control Activity Detected192.168.2.450076147.185.221.1842876TCP
            2024-12-25T19:30:45.782984+010020211761Malware Command and Control Activity Detected192.168.2.450077147.185.221.1842876TCP
            2024-12-25T19:30:47.647823+010020211761Malware Command and Control Activity Detected192.168.2.450078147.185.221.1842876TCP
            2024-12-25T19:30:49.548519+010020211761Malware Command and Control Activity Detected192.168.2.450079147.185.221.1842876TCP
            2024-12-25T19:30:51.409873+010020211761Malware Command and Control Activity Detected192.168.2.450080147.185.221.1842876TCP
            2024-12-25T19:30:53.339640+010020211761Malware Command and Control Activity Detected192.168.2.450081147.185.221.1842876TCP
            2024-12-25T19:30:55.232783+010020211761Malware Command and Control Activity Detected192.168.2.450082147.185.221.1842876TCP
            2024-12-25T19:30:57.111374+010020211761Malware Command and Control Activity Detected192.168.2.450083147.185.221.1842876TCP
            2024-12-25T19:30:58.988654+010020211761Malware Command and Control Activity Detected192.168.2.450084147.185.221.1842876TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-25T19:27:01.311411+010020331321Malware Command and Control Activity Detected192.168.2.449730147.185.221.1842876TCP
            2024-12-25T19:27:04.782030+010020331321Malware Command and Control Activity Detected192.168.2.449731147.185.221.1842876TCP
            2024-12-25T19:27:08.629357+010020331321Malware Command and Control Activity Detected192.168.2.449732147.185.221.1842876TCP
            2024-12-25T19:27:12.521222+010020331321Malware Command and Control Activity Detected192.168.2.449733147.185.221.1842876TCP
            2024-12-25T19:27:16.605337+010020331321Malware Command and Control Activity Detected192.168.2.449736147.185.221.1842876TCP
            2024-12-25T19:27:20.441669+010020331321Malware Command and Control Activity Detected192.168.2.449740147.185.221.1842876TCP
            2024-12-25T19:27:24.279456+010020331321Malware Command and Control Activity Detected192.168.2.449742147.185.221.1842876TCP
            2024-12-25T19:27:28.109295+010020331321Malware Command and Control Activity Detected192.168.2.449743147.185.221.1842876TCP
            2024-12-25T19:27:31.985928+010020331321Malware Command and Control Activity Detected192.168.2.449744147.185.221.1842876TCP
            2024-12-25T19:27:35.816452+010020331321Malware Command and Control Activity Detected192.168.2.449745147.185.221.1842876TCP
            2024-12-25T19:27:39.671891+010020331321Malware Command and Control Activity Detected192.168.2.449746147.185.221.1842876TCP
            2024-12-25T19:27:43.502795+010020331321Malware Command and Control Activity Detected192.168.2.449747147.185.221.1842876TCP
            2024-12-25T19:27:47.381066+010020331321Malware Command and Control Activity Detected192.168.2.449748147.185.221.1842876TCP
            2024-12-25T19:27:51.416703+010020331321Malware Command and Control Activity Detected192.168.2.449749147.185.221.1842876TCP
            2024-12-25T19:27:55.256662+010020331321Malware Command and Control Activity Detected192.168.2.449751147.185.221.1842876TCP
            2024-12-25T19:27:59.110643+010020331321Malware Command and Control Activity Detected192.168.2.449763147.185.221.1842876TCP
            2024-12-25T19:28:02.984793+010020331321Malware Command and Control Activity Detected192.168.2.449769147.185.221.1842876TCP
            2024-12-25T19:28:06.673988+010020331321Malware Command and Control Activity Detected192.168.2.449779147.185.221.1842876TCP
            2024-12-25T19:28:10.290338+010020331321Malware Command and Control Activity Detected192.168.2.449789147.185.221.1842876TCP
            2024-12-25T19:28:13.798520+010020331321Malware Command and Control Activity Detected192.168.2.449796147.185.221.1842876TCP
            2024-12-25T19:28:17.435879+010020331321Malware Command and Control Activity Detected192.168.2.449806147.185.221.1842876TCP
            2024-12-25T19:28:20.742541+010020331321Malware Command and Control Activity Detected192.168.2.449813147.185.221.1842876TCP
            2024-12-25T19:28:23.895442+010020331321Malware Command and Control Activity Detected192.168.2.449823147.185.221.1842876TCP
            2024-12-25T19:28:27.015106+010020331321Malware Command and Control Activity Detected192.168.2.449830147.185.221.1842876TCP
            2024-12-25T19:28:30.031254+010020331321Malware Command and Control Activity Detected192.168.2.449836147.185.221.1842876TCP
            2024-12-25T19:28:56.960211+010020331321Malware Command and Control Activity Detected192.168.2.449893147.185.221.1842876TCP
            2024-12-25T19:28:59.828732+010020331321Malware Command and Control Activity Detected192.168.2.449902147.185.221.1842876TCP
            2024-12-25T19:29:02.596571+010020331321Malware Command and Control Activity Detected192.168.2.449909147.185.221.1842876TCP
            2024-12-25T19:29:05.380948+010020331321Malware Command and Control Activity Detected192.168.2.449915147.185.221.1842876TCP
            2024-12-25T19:29:08.464794+010020331321Malware Command and Control Activity Detected192.168.2.449921147.185.221.1842876TCP
            2024-12-25T19:29:11.059281+010020331321Malware Command and Control Activity Detected192.168.2.449927147.185.221.1842876TCP
            2024-12-25T19:29:13.563423+010020331321Malware Command and Control Activity Detected192.168.2.449933147.185.221.1842876TCP
            2024-12-25T19:29:16.067195+010020331321Malware Command and Control Activity Detected192.168.2.449940147.185.221.1842876TCP
            2024-12-25T19:29:18.553373+010020331321Malware Command and Control Activity Detected192.168.2.449947147.185.221.1842876TCP
            2024-12-25T19:29:21.005336+010020331321Malware Command and Control Activity Detected192.168.2.449954147.185.221.1842876TCP
            2024-12-25T19:29:23.394832+010020331321Malware Command and Control Activity Detected192.168.2.449960147.185.221.1842876TCP
            2024-12-25T19:29:25.827890+010020331321Malware Command and Control Activity Detected192.168.2.449966147.185.221.1842876TCP
            2024-12-25T19:29:28.796450+010020331321Malware Command and Control Activity Detected192.168.2.449972147.185.221.1842876TCP
            2024-12-25T19:29:31.016652+010020331321Malware Command and Control Activity Detected192.168.2.449977147.185.221.1842876TCP
            2024-12-25T19:29:33.308343+010020331321Malware Command and Control Activity Detected192.168.2.449983147.185.221.1842876TCP
            2024-12-25T19:29:35.532168+010020331321Malware Command and Control Activity Detected192.168.2.449989147.185.221.1842876TCP
            2024-12-25T19:29:37.713030+010020331321Malware Command and Control Activity Detected192.168.2.449995147.185.221.1842876TCP
            2024-12-25T19:29:39.891898+010020331321Malware Command and Control Activity Detected192.168.2.450001147.185.221.1842876TCP
            2024-12-25T19:29:42.069274+010020331321Malware Command and Control Activity Detected192.168.2.450007147.185.221.1842876TCP
            2024-12-25T19:29:44.227018+010020331321Malware Command and Control Activity Detected192.168.2.450013147.185.221.1842876TCP
            2024-12-25T19:29:46.487974+010020331321Malware Command and Control Activity Detected192.168.2.450019147.185.221.1842876TCP
            2024-12-25T19:29:48.630910+010020331321Malware Command and Control Activity Detected192.168.2.450024147.185.221.1842876TCP
            2024-12-25T19:29:50.710170+010020331321Malware Command and Control Activity Detected192.168.2.450030147.185.221.1842876TCP
            2024-12-25T19:29:52.763223+010020331321Malware Command and Control Activity Detected192.168.2.450036147.185.221.1842876TCP
            2024-12-25T19:29:54.859952+010020331321Malware Command and Control Activity Detected192.168.2.450040147.185.221.1842876TCP
            2024-12-25T19:29:56.943978+010020331321Malware Command and Control Activity Detected192.168.2.450046147.185.221.1842876TCP
            2024-12-25T19:29:59.035178+010020331321Malware Command and Control Activity Detected192.168.2.450051147.185.221.1842876TCP
            2024-12-25T19:30:01.060620+010020331321Malware Command and Control Activity Detected192.168.2.450054147.185.221.1842876TCP
            2024-12-25T19:30:03.136417+010020331321Malware Command and Control Activity Detected192.168.2.450055147.185.221.1842876TCP
            2024-12-25T19:30:05.144405+010020331321Malware Command and Control Activity Detected192.168.2.450056147.185.221.1842876TCP
            2024-12-25T19:30:07.114444+010020331321Malware Command and Control Activity Detected192.168.2.450057147.185.221.1842876TCP
            2024-12-25T19:30:09.158428+010020331321Malware Command and Control Activity Detected192.168.2.450058147.185.221.1842876TCP
            2024-12-25T19:30:11.116363+010020331321Malware Command and Control Activity Detected192.168.2.450059147.185.221.1842876TCP
            2024-12-25T19:30:13.048197+010020331321Malware Command and Control Activity Detected192.168.2.450060147.185.221.1842876TCP
            2024-12-25T19:30:15.023097+010020331321Malware Command and Control Activity Detected192.168.2.450061147.185.221.1842876TCP
            2024-12-25T19:30:17.017306+010020331321Malware Command and Control Activity Detected192.168.2.450062147.185.221.1842876TCP
            2024-12-25T19:30:18.970100+010020331321Malware Command and Control Activity Detected192.168.2.450063147.185.221.1842876TCP
            2024-12-25T19:30:21.064635+010020331321Malware Command and Control Activity Detected192.168.2.450064147.185.221.1842876TCP
            2024-12-25T19:30:23.067903+010020331321Malware Command and Control Activity Detected192.168.2.450065147.185.221.1842876TCP
            2024-12-25T19:30:24.909726+010020331321Malware Command and Control Activity Detected192.168.2.450066147.185.221.1842876TCP
            2024-12-25T19:30:26.800683+010020331321Malware Command and Control Activity Detected192.168.2.450067147.185.221.1842876TCP
            2024-12-25T19:30:28.697052+010020331321Malware Command and Control Activity Detected192.168.2.450068147.185.221.1842876TCP
            2024-12-25T19:30:30.621315+010020331321Malware Command and Control Activity Detected192.168.2.450069147.185.221.1842876TCP
            2024-12-25T19:30:32.505468+010020331321Malware Command and Control Activity Detected192.168.2.450070147.185.221.1842876TCP
            2024-12-25T19:30:34.395945+010020331321Malware Command and Control Activity Detected192.168.2.450071147.185.221.1842876TCP
            2024-12-25T19:30:36.284419+010020331321Malware Command and Control Activity Detected192.168.2.450072147.185.221.1842876TCP
            2024-12-25T19:30:38.189590+010020331321Malware Command and Control Activity Detected192.168.2.450073147.185.221.1842876TCP
            2024-12-25T19:30:40.087676+010020331321Malware Command and Control Activity Detected192.168.2.450074147.185.221.1842876TCP
            2024-12-25T19:30:42.007971+010020331321Malware Command and Control Activity Detected192.168.2.450075147.185.221.1842876TCP
            2024-12-25T19:30:43.888278+010020331321Malware Command and Control Activity Detected192.168.2.450076147.185.221.1842876TCP
            2024-12-25T19:30:45.782984+010020331321Malware Command and Control Activity Detected192.168.2.450077147.185.221.1842876TCP
            2024-12-25T19:30:47.647823+010020331321Malware Command and Control Activity Detected192.168.2.450078147.185.221.1842876TCP
            2024-12-25T19:30:49.548519+010020331321Malware Command and Control Activity Detected192.168.2.450079147.185.221.1842876TCP
            2024-12-25T19:30:51.409873+010020331321Malware Command and Control Activity Detected192.168.2.450080147.185.221.1842876TCP
            2024-12-25T19:30:53.339640+010020331321Malware Command and Control Activity Detected192.168.2.450081147.185.221.1842876TCP
            2024-12-25T19:30:55.232783+010020331321Malware Command and Control Activity Detected192.168.2.450082147.185.221.1842876TCP
            2024-12-25T19:30:57.111374+010020331321Malware Command and Control Activity Detected192.168.2.450083147.185.221.1842876TCP
            2024-12-25T19:30:58.988654+010020331321Malware Command and Control Activity Detected192.168.2.450084147.185.221.1842876TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-25T19:27:32.633274+010028255641Malware Command and Control Activity Detected192.168.2.449744147.185.221.1842876TCP
            2024-12-25T19:27:45.137550+010028255641Malware Command and Control Activity Detected192.168.2.449747147.185.221.1842876TCP
            2024-12-25T19:27:52.530998+010028255641Malware Command and Control Activity Detected192.168.2.449749147.185.221.1842876TCP
            2024-12-25T19:28:00.056725+010028255641Malware Command and Control Activity Detected192.168.2.449763147.185.221.1842876TCP
            2024-12-25T19:28:03.452295+010028255641Malware Command and Control Activity Detected192.168.2.449769147.185.221.1842876TCP
            2024-12-25T19:28:06.916756+010028255641Malware Command and Control Activity Detected192.168.2.449779147.185.221.1842876TCP
            2024-12-25T19:29:12.016440+010028255641Malware Command and Control Activity Detected192.168.2.449927147.185.221.1842876TCP
            2024-12-25T19:29:17.797691+010028255641Malware Command and Control Activity Detected192.168.2.449940147.185.221.1842876TCP
            2024-12-25T19:29:19.739101+010028255641Malware Command and Control Activity Detected192.168.2.449947147.185.221.1842876TCP
            2024-12-25T19:29:21.315622+010028255641Malware Command and Control Activity Detected192.168.2.449954147.185.221.1842876TCP
            2024-12-25T19:29:23.636305+010028255641Malware Command and Control Activity Detected192.168.2.449960147.185.221.1842876TCP
            2024-12-25T19:29:26.234384+010028255641Malware Command and Control Activity Detected192.168.2.449966147.185.221.1842876TCP
            2024-12-25T19:29:29.140402+010028255641Malware Command and Control Activity Detected192.168.2.449972147.185.221.1842876TCP
            2024-12-25T19:29:31.258357+010028255641Malware Command and Control Activity Detected192.168.2.449977147.185.221.1842876TCP
            2024-12-25T19:29:42.317709+010028255641Malware Command and Control Activity Detected192.168.2.450007147.185.221.1842876TCP
            2024-12-25T19:30:05.384843+010028255641Malware Command and Control Activity Detected192.168.2.450056147.185.221.1842876TCP
            2024-12-25T19:30:15.803404+010028255641Malware Command and Control Activity Detected192.168.2.450061147.185.221.1842876TCP
            2024-12-25T19:30:48.135698+010028255641Malware Command and Control Activity Detected192.168.2.450078147.185.221.1842876TCP
            2024-12-25T19:30:56.291850+010028255641Malware Command and Control Activity Detected192.168.2.450082147.185.221.1842876TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: gReXLT7XjR.exeAvira: detected
            Source: C:\Users\user\AppData\Local\DeadMom.exeAvira: detection malicious, Label: TR/Dropper.Gen
            Source: C:\Users\user\AppData\Local\DeadMom.exeAvira: detection malicious, Label: TR/Dropper.Gen
            Source: C:\Users\user\AppData\Local\DeadMom.exeAvira: detection malicious, Label: TR/Dropper.Gen
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeAvira: detection malicious, Label: TR/Dropper.Gen
            Source: C:\Users\user\AppData\Local\DeadMom.exeAvira: detection malicious, Label: TR/Dropper.Gen
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeAvira: detection malicious, Label: TR/Dropper.Gen
            Source: C:\Users\user\AppData\Local\DeadMom.exeAvira: detection malicious, Label: TR/Dropper.Gen
            Source: C:\Windows\server.exeAvira: detection malicious, Label: TR/Dropper.Gen
            Source: C:\Users\user\AppData\Local\DeadMom.exeAvira: detection malicious, Label: TR/Dropper.Gen
            Source: C:\Kaspersky Anti-Virus Flash.exeAvira: detection malicious, Label: TR/Dropper.Gen
            Source: C:\Users\user\AppData\Local\DeadMom.exeAvira: detection malicious, Label: TR/Dropper.Gen
            Source: 0.0.gReXLT7XjR.exe.510000.0.unpackMalware Configuration Extractor: Njrat {"Campaign ID": "HacKed", "Version": "0.7d", "Install Name": "445c7762b8f06a76352fcac2e22df159", "Install Dir": "Kaspersky Anti-Virus Flash", "Registry Value": "Software\\Microsoft\\Windows\\CurrentVersion\\Run", "Network Seprator": "|'|'|"}
            Source: C:\Kaspersky Anti-Virus Flash.exeReversingLabs: Detection: 86%
            Source: C:\Users\user\AppData\Local\DeadMom.exeReversingLabs: Detection: 86%
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\History\DeadMom.exeReversingLabs: Detection: 86%
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\DeadMom.exeReversingLabs: Detection: 86%
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\DeadMom.exeReversingLabs: Detection: 86%
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeReversingLabs: Detection: 86%
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exeReversingLabs: Detection: 86%
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeReversingLabs: Detection: 86%
            Source: C:\Users\user\Favorites\DeadMom.exeReversingLabs: Detection: 86%
            Source: C:\Windows\SysWOW64\DeadMom.exeReversingLabs: Detection: 86%
            Source: C:\Windows\server.exeReversingLabs: Detection: 86%
            Source: gReXLT7XjR.exeReversingLabs: Detection: 86%
            Source: gReXLT7XjR.exeVirustotal: Detection: 70%Perma Link
            Source: Yara matchFile source: gReXLT7XjR.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.gReXLT7XjR.exe.510000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.1679600607.0000000003B08000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000000.1661776984.0000000000512000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.4112787916.00000000034F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: gReXLT7XjR.exe PID: 7496, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: server.exe PID: 7564, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: 445c7762b8f06a76352fcac2e22df159Windows Update.exe PID: 7996, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: DeadMom.exe PID: 8152, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: Microsoft Corporation.exe PID: 4544, type: MEMORYSTR
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exe, type: DROPPED
            Source: Yara matchFile source: C:\Users\user\AppData\Local\DeadMom.exe, type: DROPPED
            Source: Yara matchFile source: C:\Windows\server.exe, type: DROPPED
            Source: Yara matchFile source: C:\Kaspersky Anti-Virus Flash.exe, type: DROPPED
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, type: DROPPED
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: C:\Users\user\AppData\Local\DeadMom.exeJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Local\DeadMom.exeJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Local\DeadMom.exeJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Local\DeadMom.exeJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Local\DeadMom.exeJoe Sandbox ML: detected
            Source: C:\Windows\server.exeJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Local\DeadMom.exeJoe Sandbox ML: detected
            Source: C:\Kaspersky Anti-Virus Flash.exeJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Local\DeadMom.exeJoe Sandbox ML: detected
            Source: gReXLT7XjR.exeJoe Sandbox ML: detected
            Source: gReXLT7XjR.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
            Source: gReXLT7XjR.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Spreading

            barindex
            Source: gReXLT7XjR.exe, Usb1.cs.Net Code: infect
            Source: server.exe.0.dr, Usb1.cs.Net Code: infect
            Source: DeadMom.exe.1.dr, Usb1.cs.Net Code: infect
            Source: DeadMom.exe0.1.dr, Usb1.cs.Net Code: infect
            Source: DeadMom.exe1.1.dr, Usb1.cs.Net Code: infect
            Source: Kaspersky Anti-Virus Flash.exe.1.dr, Usb1.cs.Net Code: infect
            Source: DeadMom.exe2.1.dr, Usb1.cs.Net Code: infect
            Source: Microsoft Corporation.exe.1.dr, Usb1.cs.Net Code: infect
            Source: 445c7762b8f06a76352fcac2e22df159Windows Update.exe.1.dr, Usb1.cs.Net Code: infect
            Source: DeadMom.exe3.1.dr, Usb1.cs.Net Code: infect
            Source: DeadMom.exe4.1.dr, Usb1.cs.Net Code: infect
            Source: gReXLT7XjR.exe, 00000000.00000002.1679600607.0000000003B08000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \autorun.inf
            Source: gReXLT7XjR.exe, 00000000.00000002.1679600607.0000000003B08000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: [autorun]
            Source: gReXLT7XjR.exe, 00000000.00000002.1679600607.0000000003B08000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: autorun.inf
            Source: gReXLT7XjR.exe, 00000000.00000000.1661776984.0000000000512000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: \autorun.inf
            Source: gReXLT7XjR.exe, 00000000.00000000.1661776984.0000000000512000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: [autorun]
            Source: gReXLT7XjR.exe, 00000000.00000000.1661776984.0000000000512000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: autorun.inf
            Source: gReXLT7XjR.exeBinary or memory string: \autorun.inf
            Source: gReXLT7XjR.exeBinary or memory string: [autorun]
            Source: gReXLT7XjR.exeBinary or memory string: autorun.inf
            Source: DeadMom.exe1.1.drBinary or memory string: \autorun.inf
            Source: DeadMom.exe1.1.drBinary or memory string: [autorun]
            Source: DeadMom.exe1.1.drBinary or memory string: autorun.inf
            Source: DeadMom.exe4.1.drBinary or memory string: \autorun.inf
            Source: DeadMom.exe4.1.drBinary or memory string: [autorun]
            Source: DeadMom.exe4.1.drBinary or memory string: autorun.inf
            Source: DeadMom.exe5.1.drBinary or memory string: \autorun.inf
            Source: DeadMom.exe5.1.drBinary or memory string: [autorun]
            Source: DeadMom.exe5.1.drBinary or memory string: autorun.inf
            Source: Microsoft Corporation.exe.1.drBinary or memory string: \autorun.inf
            Source: Microsoft Corporation.exe.1.drBinary or memory string: [autorun]
            Source: Microsoft Corporation.exe.1.drBinary or memory string: autorun.inf
            Source: DeadMom.exe2.1.drBinary or memory string: \autorun.inf
            Source: DeadMom.exe2.1.drBinary or memory string: [autorun]
            Source: DeadMom.exe2.1.drBinary or memory string: autorun.inf
            Source: 445c7762b8f06a76352fcac2e22df159Windows Update.exe.1.drBinary or memory string: \autorun.inf
            Source: 445c7762b8f06a76352fcac2e22df159Windows Update.exe.1.drBinary or memory string: [autorun]
            Source: 445c7762b8f06a76352fcac2e22df159Windows Update.exe.1.drBinary or memory string: autorun.inf
            Source: DeadMom.exe0.1.drBinary or memory string: \autorun.inf
            Source: DeadMom.exe0.1.drBinary or memory string: [autorun]
            Source: DeadMom.exe0.1.drBinary or memory string: autorun.inf
            Source: server.exe.0.drBinary or memory string: \autorun.inf
            Source: server.exe.0.drBinary or memory string: [autorun]
            Source: server.exe.0.drBinary or memory string: autorun.inf
            Source: DeadMom.exe3.1.drBinary or memory string: \autorun.inf
            Source: DeadMom.exe3.1.drBinary or memory string: [autorun]
            Source: DeadMom.exe3.1.drBinary or memory string: autorun.inf
            Source: Kaspersky Anti-Virus Flash.exe.1.drBinary or memory string: \autorun.inf
            Source: Kaspersky Anti-Virus Flash.exe.1.drBinary or memory string: [autorun]
            Source: Kaspersky Anti-Virus Flash.exe.1.drBinary or memory string: autorun.inf
            Source: DeadMom.exe.1.drBinary or memory string: \autorun.inf
            Source: DeadMom.exe.1.drBinary or memory string: [autorun]
            Source: DeadMom.exe.1.drBinary or memory string: autorun.inf
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Jump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Jump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exeFile opened: C:\Users\user\AppData\Jump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exeFile opened: C:\Users\user\Jump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:49746 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:49746 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:49736 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:49733 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:49733 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:49736 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:49748 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:49731 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:49748 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:49731 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:49740 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:49740 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:49751 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:49751 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:49730 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:49742 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:49742 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:49730 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:49779 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:49779 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2825564 - Severity 1 - ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act) : 192.168.2.4:49779 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:49732 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:49789 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:49732 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:49789 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:49796 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:49796 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:49743 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:49743 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:49744 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:49744 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:49749 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2825564 - Severity 1 - ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act) : 192.168.2.4:49744 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:49749 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2825564 - Severity 1 - ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act) : 192.168.2.4:49749 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:49763 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:49763 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2825564 - Severity 1 - ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act) : 192.168.2.4:49763 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:49769 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:49745 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:49745 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:49769 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2825564 - Severity 1 - ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act) : 192.168.2.4:49769 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:49806 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:49806 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:49747 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:49747 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:49830 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:49830 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:49823 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:49823 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:49836 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:49836 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2825564 - Severity 1 - ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act) : 192.168.2.4:49747 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:49813 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:49813 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:49902 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:49902 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:49893 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:49909 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:49909 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:49893 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:49915 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:49915 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:49921 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:49921 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:49933 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:49933 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:49927 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:49927 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2825564 - Severity 1 - ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act) : 192.168.2.4:49927 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:49940 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:49954 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:49940 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:49947 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:49947 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2825564 - Severity 1 - ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act) : 192.168.2.4:49947 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:49954 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:49960 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2825564 - Severity 1 - ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act) : 192.168.2.4:49940 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2825564 - Severity 1 - ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act) : 192.168.2.4:49954 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:49966 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:49960 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2825564 - Severity 1 - ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act) : 192.168.2.4:49960 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:49977 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:49972 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:49977 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:49972 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2825564 - Severity 1 - ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act) : 192.168.2.4:49977 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:49966 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:49989 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:49989 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2825564 - Severity 1 - ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act) : 192.168.2.4:49972 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:50001 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:50001 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2825564 - Severity 1 - ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act) : 192.168.2.4:49966 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:49983 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:50007 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:50007 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:49983 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:50013 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2825564 - Severity 1 - ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act) : 192.168.2.4:50007 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:50013 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:50024 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:50024 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:49995 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:49995 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:50036 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:50036 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:50030 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:50040 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:50019 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:50040 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:50030 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:50019 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:50051 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:50051 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:50055 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:50055 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:50057 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:50057 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:50061 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:50061 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:50059 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:50059 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2825564 - Severity 1 - ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act) : 192.168.2.4:50061 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:50063 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:50056 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:50054 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:50068 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:50058 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:50063 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:50060 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:50058 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:50054 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:50065 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:50060 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:50056 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:50068 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:50067 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:50080 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2825564 - Severity 1 - ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act) : 192.168.2.4:50056 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:50070 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:50062 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:50070 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:50077 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:50077 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:50082 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:50065 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:50080 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:50082 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:50067 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:50072 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:50069 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:50072 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:50069 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:50076 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2825564 - Severity 1 - ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act) : 192.168.2.4:50082 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:50062 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:50074 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:50066 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:50076 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:50066 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:50073 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:50081 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:50083 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:50083 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:50079 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:50075 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:50074 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:50081 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:50064 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:50064 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:50075 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:50079 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:50073 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:50084 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:50084 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:50078 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:50078 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2825564 - Severity 1 - ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act) : 192.168.2.4:50078 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:50046 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:50046 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:50071 -> 147.185.221.18:42876
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:50071 -> 147.185.221.18:42876
            Source: global trafficTCP traffic: 147.185.221.18 ports 42876,2,4,6,7,8
            Source: global trafficTCP traffic: 192.168.2.4:49730 -> 147.185.221.18:42876
            Source: Joe Sandbox ViewIP Address: 147.185.221.18 147.185.221.18
            Source: Joe Sandbox ViewASN Name: SALSGIVERUS SALSGIVERUS
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficDNS traffic detected: DNS query: company-telecom.gl.at.ply.gg
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
            Source: C:\Windows\server.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

            E-Banking Fraud

            barindex
            Source: Yara matchFile source: gReXLT7XjR.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.gReXLT7XjR.exe.510000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.1679600607.0000000003B08000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000000.1661776984.0000000000512000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.4112787916.00000000034F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: gReXLT7XjR.exe PID: 7496, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: server.exe PID: 7564, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: 445c7762b8f06a76352fcac2e22df159Windows Update.exe PID: 7996, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: DeadMom.exe PID: 8152, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: Microsoft Corporation.exe PID: 4544, type: MEMORYSTR
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exe, type: DROPPED
            Source: Yara matchFile source: C:\Users\user\AppData\Local\DeadMom.exe, type: DROPPED
            Source: Yara matchFile source: C:\Windows\server.exe, type: DROPPED
            Source: Yara matchFile source: C:\Kaspersky Anti-Virus Flash.exe, type: DROPPED
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, type: DROPPED

            System Summary

            barindex
            Source: gReXLT7XjR.exe, type: SAMPLEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
            Source: gReXLT7XjR.exe, type: SAMPLEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: gReXLT7XjR.exe, type: SAMPLEMatched rule: Detects njRAT based on some strings Author: Sekoia.io
            Source: gReXLT7XjR.exe, type: SAMPLEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: gReXLT7XjR.exe, type: SAMPLEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: 0.0.gReXLT7XjR.exe.510000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
            Source: 0.0.gReXLT7XjR.exe.510000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: 0.0.gReXLT7XjR.exe.510000.0.unpack, type: UNPACKEDPEMatched rule: Detects njRAT based on some strings Author: Sekoia.io
            Source: 0.0.gReXLT7XjR.exe.510000.0.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 0.0.gReXLT7XjR.exe.510000.0.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: 00000000.00000002.1679600607.0000000003B08000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
            Source: 00000000.00000002.1679600607.0000000003B08000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 00000000.00000000.1661776984.0000000000512000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
            Source: 00000000.00000000.1661776984.0000000000512000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exe, type: DROPPEDMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exe, type: DROPPEDMatched rule: Detects njRAT based on some strings Author: Sekoia.io
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exe, type: DROPPEDMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Users\user\AppData\Local\DeadMom.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
            Source: C:\Users\user\AppData\Local\DeadMom.exe, type: DROPPEDMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: C:\Users\user\AppData\Local\DeadMom.exe, type: DROPPEDMatched rule: Detects njRAT based on some strings Author: Sekoia.io
            Source: C:\Users\user\AppData\Local\DeadMom.exe, type: DROPPEDMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: C:\Users\user\AppData\Local\DeadMom.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Users\user\AppData\Local\DeadMom.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Users\user\AppData\Local\DeadMom.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Users\user\AppData\Local\DeadMom.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Users\user\AppData\Local\DeadMom.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Users\user\AppData\Local\DeadMom.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Users\user\AppData\Local\DeadMom.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Users\user\AppData\Local\DeadMom.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Users\user\AppData\Local\DeadMom.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Users\user\AppData\Local\DeadMom.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Users\user\AppData\Local\DeadMom.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Users\user\AppData\Local\DeadMom.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Users\user\AppData\Local\DeadMom.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Users\user\AppData\Local\DeadMom.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Users\user\AppData\Local\DeadMom.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Users\user\AppData\Local\DeadMom.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Users\user\AppData\Local\DeadMom.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Users\user\AppData\Local\DeadMom.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Users\user\AppData\Local\DeadMom.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Windows\server.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
            Source: C:\Windows\server.exe, type: DROPPEDMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: C:\Windows\server.exe, type: DROPPEDMatched rule: Detects njRAT based on some strings Author: Sekoia.io
            Source: C:\Windows\server.exe, type: DROPPEDMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: C:\Windows\server.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Kaspersky Anti-Virus Flash.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
            Source: C:\Kaspersky Anti-Virus Flash.exe, type: DROPPEDMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: C:\Kaspersky Anti-Virus Flash.exe, type: DROPPEDMatched rule: Detects njRAT based on some strings Author: Sekoia.io
            Source: C:\Kaspersky Anti-Virus Flash.exe, type: DROPPEDMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: C:\Kaspersky Anti-Virus Flash.exe, type: DROPPEDMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: C:\Kaspersky Anti-Virus Flash.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Kaspersky Anti-Virus Flash.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Kaspersky Anti-Virus Flash.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Kaspersky Anti-Virus Flash.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Kaspersky Anti-Virus Flash.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Kaspersky Anti-Virus Flash.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Kaspersky Anti-Virus Flash.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Kaspersky Anti-Virus Flash.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Kaspersky Anti-Virus Flash.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Kaspersky Anti-Virus Flash.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Kaspersky Anti-Virus Flash.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Kaspersky Anti-Virus Flash.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, type: DROPPEDMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, type: DROPPEDMatched rule: Detects njRAT based on some strings Author: Sekoia.io
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, type: DROPPEDMatched rule: Detects njRAT based on some strings Author: Sekoia.io
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, type: DROPPEDMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Windows\server.exeProcess Stats: CPU usage > 49%
            Source: C:\Windows\server.exeCode function: 1_2_0157BDCA NtQuerySystemInformation,1_2_0157BDCA
            Source: C:\Windows\server.exeCode function: 1_2_0157BD99 NtQuerySystemInformation,1_2_0157BD99
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeFile created: C:\Windows\server.exeJump to behavior
            Source: C:\Windows\server.exeFile created: C:\Windows\SysWOW64\DeadMom.exeJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeCode function: 0_2_04CE42980_2_04CE4298
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeCode function: 0_2_04CE45440_2_04CE4544
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeCode function: 0_2_04CE505D0_2_04CE505D
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeCode function: 0_2_04CE4B5B0_2_04CE4B5B
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeCode function: 0_2_04CE54590_2_04CE5459
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeCode function: 0_2_04CE47D40_2_04CE47D4
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeCode function: 0_2_04CE536F0_2_04CE536F
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeCode function: 0_2_04CE50E30_2_04CE50E3
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeCode function: 0_2_04CE49F90_2_04CE49F9
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeCode function: 0_2_04CE44F10_2_04CE44F1
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeCode function: 0_2_04CE470F0_2_04CE470F
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeCode function: 0_2_04CE4C8F0_2_04CE4C8F
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeCode function: 0_2_04CE42870_2_04CE4287
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeCode function: 0_2_04CE50000_2_04CE5000
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeCode function: 0_2_04CE4F9D0_2_04CE4F9D
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeCode function: 0_2_04CE499D0_2_04CE499D
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeCode function: 0_2_04CE4F2F0_2_04CE4F2F
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeCode function: 0_2_04CE49360_2_04CE4936
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeCode function: 0_2_04CE46300_2_04CE4630
            Source: C:\Windows\server.exeCode function: 1_2_056979101_2_05697910
            Source: C:\Windows\server.exeCode function: 1_2_056974D71_2_056974D7
            Source: C:\Windows\server.exeCode function: 1_2_056942981_2_05694298
            Source: C:\Windows\server.exeCode function: 1_2_056942691_2_05694269
            Source: C:\Windows\server.exeCode function: 1_2_0569536F1_2_0569536F
            Source: C:\Windows\server.exeCode function: 1_2_056945441_2_05694544
            Source: C:\Windows\server.exeCode function: 1_2_056954591_2_05695459
            Source: C:\Windows\server.exeCode function: 1_2_05694B5B1_2_05694B5B
            Source: C:\Windows\server.exeCode function: 1_2_0569505D1_2_0569505D
            Source: C:\Windows\server.exeCode function: 1_2_05694F2F1_2_05694F2F
            Source: C:\Windows\server.exeCode function: 1_2_056946301_2_05694630
            Source: C:\Windows\server.exeCode function: 1_2_056949361_2_05694936
            Source: C:\Windows\server.exeCode function: 1_2_0569470F1_2_0569470F
            Source: C:\Windows\server.exeCode function: 1_2_056950001_2_05695000
            Source: C:\Windows\server.exeCode function: 1_2_056950E31_2_056950E3
            Source: C:\Windows\server.exeCode function: 1_2_056949F91_2_056949F9
            Source: C:\Windows\server.exeCode function: 1_2_056944F11_2_056944F1
            Source: C:\Windows\server.exeCode function: 1_2_056947D41_2_056947D4
            Source: C:\Windows\server.exeCode function: 1_2_05694C8F1_2_05694C8F
            Source: C:\Windows\server.exeCode function: 1_2_05694F9D1_2_05694F9D
            Source: C:\Windows\server.exeCode function: 1_2_0569499D1_2_0569499D
            Source: gReXLT7XjR.exe, 00000000.00000002.1678719492.000000000092E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs gReXLT7XjR.exe
            Source: gReXLT7XjR.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: gReXLT7XjR.exe, type: SAMPLEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
            Source: gReXLT7XjR.exe, type: SAMPLEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: gReXLT7XjR.exe, type: SAMPLEMatched rule: crimeware_njrat_strings author = Sekoia.io, description = Detects njRAT based on some strings, creation_date = 2022-08-22, classification = TLP:CLEAR, version = 1.0, id = 215807ae-fbcb-478d-8941-e0787b883669
            Source: gReXLT7XjR.exe, type: SAMPLEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: gReXLT7XjR.exe, type: SAMPLEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: 0.0.gReXLT7XjR.exe.510000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
            Source: 0.0.gReXLT7XjR.exe.510000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.0.gReXLT7XjR.exe.510000.0.unpack, type: UNPACKEDPEMatched rule: crimeware_njrat_strings author = Sekoia.io, description = Detects njRAT based on some strings, creation_date = 2022-08-22, classification = TLP:CLEAR, version = 1.0, id = 215807ae-fbcb-478d-8941-e0787b883669
            Source: 0.0.gReXLT7XjR.exe.510000.0.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 0.0.gReXLT7XjR.exe.510000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: 00000000.00000002.1679600607.0000000003B08000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
            Source: 00000000.00000002.1679600607.0000000003B08000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 00000000.00000000.1661776984.0000000000512000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
            Source: 00000000.00000000.1661776984.0000000000512000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exe, type: DROPPEDMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exe, type: DROPPEDMatched rule: crimeware_njrat_strings author = Sekoia.io, description = Detects njRAT based on some strings, creation_date = 2022-08-22, classification = TLP:CLEAR, version = 1.0, id = 215807ae-fbcb-478d-8941-e0787b883669
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exe, type: DROPPEDMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Users\user\AppData\Local\DeadMom.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
            Source: C:\Users\user\AppData\Local\DeadMom.exe, type: DROPPEDMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: C:\Users\user\AppData\Local\DeadMom.exe, type: DROPPEDMatched rule: crimeware_njrat_strings author = Sekoia.io, description = Detects njRAT based on some strings, creation_date = 2022-08-22, classification = TLP:CLEAR, version = 1.0, id = 215807ae-fbcb-478d-8941-e0787b883669
            Source: C:\Users\user\AppData\Local\DeadMom.exe, type: DROPPEDMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: C:\Users\user\AppData\Local\DeadMom.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Users\user\AppData\Local\DeadMom.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Users\user\AppData\Local\DeadMom.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Users\user\AppData\Local\DeadMom.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Users\user\AppData\Local\DeadMom.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Users\user\AppData\Local\DeadMom.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Users\user\AppData\Local\DeadMom.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Users\user\AppData\Local\DeadMom.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Users\user\AppData\Local\DeadMom.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Users\user\AppData\Local\DeadMom.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Users\user\AppData\Local\DeadMom.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Users\user\AppData\Local\DeadMom.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Users\user\AppData\Local\DeadMom.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Users\user\AppData\Local\DeadMom.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Users\user\AppData\Local\DeadMom.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Users\user\AppData\Local\DeadMom.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Users\user\AppData\Local\DeadMom.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Users\user\AppData\Local\DeadMom.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Users\user\AppData\Local\DeadMom.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Windows\server.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
            Source: C:\Windows\server.exe, type: DROPPEDMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: C:\Windows\server.exe, type: DROPPEDMatched rule: crimeware_njrat_strings author = Sekoia.io, description = Detects njRAT based on some strings, creation_date = 2022-08-22, classification = TLP:CLEAR, version = 1.0, id = 215807ae-fbcb-478d-8941-e0787b883669
            Source: C:\Windows\server.exe, type: DROPPEDMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: C:\Windows\server.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Kaspersky Anti-Virus Flash.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
            Source: C:\Kaspersky Anti-Virus Flash.exe, type: DROPPEDMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: C:\Kaspersky Anti-Virus Flash.exe, type: DROPPEDMatched rule: crimeware_njrat_strings author = Sekoia.io, description = Detects njRAT based on some strings, creation_date = 2022-08-22, classification = TLP:CLEAR, version = 1.0, id = 215807ae-fbcb-478d-8941-e0787b883669
            Source: C:\Kaspersky Anti-Virus Flash.exe, type: DROPPEDMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: C:\Kaspersky Anti-Virus Flash.exe, type: DROPPEDMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: C:\Kaspersky Anti-Virus Flash.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Kaspersky Anti-Virus Flash.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Kaspersky Anti-Virus Flash.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Kaspersky Anti-Virus Flash.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Kaspersky Anti-Virus Flash.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Kaspersky Anti-Virus Flash.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Kaspersky Anti-Virus Flash.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Kaspersky Anti-Virus Flash.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Kaspersky Anti-Virus Flash.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Kaspersky Anti-Virus Flash.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Kaspersky Anti-Virus Flash.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Kaspersky Anti-Virus Flash.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, type: DROPPEDMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, type: DROPPEDMatched rule: crimeware_njrat_strings author = Sekoia.io, description = Detects njRAT based on some strings, creation_date = 2022-08-22, classification = TLP:CLEAR, version = 1.0, id = 215807ae-fbcb-478d-8941-e0787b883669
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, type: DROPPEDMatched rule: crimeware_njrat_strings author = Sekoia.io, description = Detects njRAT based on some strings, creation_date = 2022-08-22, classification = TLP:CLEAR, version = 1.0, id = 215807ae-fbcb-478d-8941-e0787b883669
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, type: DROPPEDMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: classification engineClassification label: mal100.spre.phis.troj.adwa.evad.winEXE@16/19@1/1
            Source: C:\Windows\server.exeCode function: 1_2_0157BC4E AdjustTokenPrivileges,1_2_0157BC4E
            Source: C:\Windows\server.exeCode function: 1_2_0157BC17 AdjustTokenPrivileges,1_2_0157BC17
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeFile created: C:\Users\user\AppData\Roaming\appJump to behavior
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7644:120:WilError_03
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeMutant created: NULL
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7744:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7752:120:WilError_03
            Source: C:\Windows\server.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
            Source: C:\Windows\server.exeMutant created: \Sessions\1\BaseNamedObjects\445c7762b8f06a76352fcac2e22df159
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeFile created: C:\Users\user\AppData\Local\Temp\FransescoPast.txtJump to behavior
            Source: gReXLT7XjR.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: gReXLT7XjR.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: gReXLT7XjR.exeReversingLabs: Detection: 86%
            Source: gReXLT7XjR.exeVirustotal: Detection: 70%
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeFile read: C:\Users\user\Desktop\gReXLT7XjR.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\gReXLT7XjR.exe "C:\Users\user\Desktop\gReXLT7XjR.exe"
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeProcess created: C:\Windows\server.exe "C:\Windows\server.exe"
            Source: C:\Windows\server.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Windows\server.exe" "server.exe" ENABLE
            Source: C:\Windows\SysWOW64\netsh.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\server.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall delete allowedprogram "C:\Windows\server.exe"
            Source: C:\Windows\server.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Windows\server.exe" "server.exe" ENABLE
            Source: C:\Windows\SysWOW64\netsh.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\netsh.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exe "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exe"
            Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exe "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exe"
            Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exe "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exe"
            Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe"
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeProcess created: C:\Windows\server.exe "C:\Windows\server.exe" Jump to behavior
            Source: C:\Windows\server.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Windows\server.exe" "server.exe" ENABLEJump to behavior
            Source: C:\Windows\server.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall delete allowedprogram "C:\Windows\server.exe"Jump to behavior
            Source: C:\Windows\server.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Windows\server.exe" "server.exe" ENABLEJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeSection loaded: slc.dllJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Windows\server.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\server.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\server.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\server.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\server.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\server.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\server.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\server.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\server.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Windows\server.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Windows\server.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Windows\server.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\server.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\server.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\server.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\server.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\server.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\server.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\server.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\server.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\server.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\server.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\server.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ifmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasmontr.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mfc42u.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: authfwcfg.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpolicyiomgr.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: firewallapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcmonitor.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3cfg.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3api.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: onex.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappcfg.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappprxy.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwcfg.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: hnetmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netshell.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nlaapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netsetupapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netiohlp.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshhttp.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: httpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshipsec.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: activeds.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: polstore.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winipsec.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: adsldpc.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshwfp.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cabinet.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2pnetsh.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2p.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rpcnsh.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: whhelper.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlancfg.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlanapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wshelper.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wevtapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: peerdistsh.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wcmapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rmclient.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mobilenetworking.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: slc.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ktmw32.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprmsg.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ifmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasmontr.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mfc42u.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: authfwcfg.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpolicyiomgr.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: firewallapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcmonitor.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3cfg.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3api.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: onex.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappcfg.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappprxy.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwcfg.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: hnetmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netshell.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nlaapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netsetupapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netiohlp.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshhttp.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: httpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshipsec.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: activeds.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: polstore.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winipsec.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: adsldpc.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshwfp.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cabinet.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2pnetsh.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2p.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rpcnsh.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: whhelper.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlancfg.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlanapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wshelper.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wevtapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: peerdistsh.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wcmapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rmclient.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mobilenetworking.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: slc.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ktmw32.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprmsg.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ifmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasmontr.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mfc42u.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: authfwcfg.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpolicyiomgr.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: firewallapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcmonitor.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3cfg.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3api.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: onex.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappcfg.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappprxy.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwcfg.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: hnetmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netshell.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nlaapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netsetupapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netiohlp.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshhttp.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: httpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshipsec.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: activeds.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: polstore.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winipsec.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: adsldpc.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshwfp.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cabinet.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2pnetsh.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2p.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rpcnsh.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: whhelper.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlancfg.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlanapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wshelper.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wevtapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: peerdistsh.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wcmapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rmclient.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mobilenetworking.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: slc.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ktmw32.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprmsg.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeSection loaded: acgenral.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeSection loaded: samcli.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeSection loaded: msacm32.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeSection loaded: winmmbase.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeSection loaded: winmmbase.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeSection loaded: aclayers.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeSection loaded: sfc.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeSection loaded: sfc_os.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Windows\server.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{674B6698-EE92-11D0-AD71-00C04FD8FDFF}\InprocServer32Jump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dllJump to behavior
            Source: gReXLT7XjR.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
            Source: gReXLT7XjR.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Data Obfuscation

            barindex
            Source: gReXLT7XjR.exe, Fransesco.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
            Source: server.exe.0.dr, Fransesco.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
            Source: DeadMom.exe.1.dr, Fransesco.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
            Source: DeadMom.exe0.1.dr, Fransesco.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
            Source: DeadMom.exe1.1.dr, Fransesco.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
            Source: Kaspersky Anti-Virus Flash.exe.1.dr, Fransesco.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
            Source: DeadMom.exe2.1.dr, Fransesco.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
            Source: Microsoft Corporation.exe.1.dr, Fransesco.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
            Source: 445c7762b8f06a76352fcac2e22df159Windows Update.exe.1.dr, Fransesco.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
            Source: DeadMom.exe3.1.dr, Fransesco.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
            Source: DeadMom.exe4.1.dr, Fransesco.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])

            Persistence and Installation Behavior

            barindex
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeExecutable created and started: C:\Windows\server.exeJump to behavior
            Source: C:\Windows\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeJump to dropped file
            Source: C:\Windows\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exeJump to dropped file
            Source: C:\Windows\server.exeFile created: C:\Kaspersky Anti-Virus Flash.exeJump to dropped file
            Source: C:\Windows\server.exeFile created: C:\Users\user\Favorites\DeadMom.exeJump to dropped file
            Source: C:\Windows\server.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\DeadMom.exeJump to dropped file
            Source: C:\Windows\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeJump to dropped file
            Source: C:\Windows\server.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\DeadMom.exeJump to dropped file
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeFile created: C:\Windows\server.exeJump to dropped file
            Source: C:\Windows\server.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\History\DeadMom.exeJump to dropped file
            Source: C:\Windows\server.exeFile created: C:\Windows\SysWOW64\DeadMom.exeJump to dropped file
            Source: C:\Windows\server.exeFile created: C:\Users\user\AppData\Local\DeadMom.exeJump to dropped file
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeFile created: C:\Windows\server.exeJump to dropped file
            Source: C:\Windows\server.exeFile created: C:\Windows\SysWOW64\DeadMom.exeJump to dropped file

            Boot Survival

            barindex
            Source: C:\Windows\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeJump to dropped file
            Source: C:\Windows\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exeJump to dropped file
            Source: C:\Windows\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeJump to dropped file
            Source: C:\Windows\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeJump to behavior
            Source: C:\Windows\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeJump to behavior
            Source: C:\Windows\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeJump to behavior
            Source: C:\Windows\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exeJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeMemory allocated: EC0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeMemory allocated: 2B00000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeMemory allocated: 4B00000 memory commit | memory reserve | memory write watchJump to behavior
            Source: C:\Windows\server.exeMemory allocated: 1870000 memory reserve | memory write watchJump to behavior
            Source: C:\Windows\server.exeMemory allocated: 34F0000 memory reserve | memory write watchJump to behavior
            Source: C:\Windows\server.exeMemory allocated: 54F0000 memory commit | memory reserve | memory write watchJump to behavior
            Source: C:\Windows\server.exeMemory allocated: 6820000 memory reserve | memory write watchJump to behavior
            Source: C:\Windows\server.exeMemory allocated: 7820000 memory commit | memory reserve | memory write watchJump to behavior
            Source: C:\Windows\server.exeMemory allocated: 7C50000 memory reserve | memory write watchJump to behavior
            Source: C:\Windows\server.exeMemory allocated: 8C50000 memory commit | memory reserve | memory write watchJump to behavior
            Source: C:\Windows\server.exeMemory allocated: 8EB0000 memory reserve | memory write watchJump to behavior
            Source: C:\Windows\server.exeMemory allocated: 9EB0000 memory reserve | memory write watchJump to behavior
            Source: C:\Windows\server.exeMemory allocated: AEB0000 memory reserve | memory write watchJump to behavior
            Source: C:\Windows\server.exeMemory allocated: BEB0000 memory commit | memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeMemory allocated: 1210000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeMemory allocated: 3350000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeMemory allocated: 13F0000 memory commit | memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exeMemory allocated: 1540000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exeMemory allocated: 3070000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exeMemory allocated: 5070000 memory commit | memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeMemory allocated: AF0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeMemory allocated: 2A30000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeMemory allocated: DC0000 memory commit | memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeCode function: 11_2_01550006 sldt word ptr [eax]11_2_01550006
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\server.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\server.exeWindow / User API: threadDelayed 895Jump to behavior
            Source: C:\Windows\server.exeWindow / User API: threadDelayed 1481Jump to behavior
            Source: C:\Windows\server.exeWindow / User API: threadDelayed 662Jump to behavior
            Source: C:\Windows\server.exeWindow / User API: threadDelayed 721Jump to behavior
            Source: C:\Windows\server.exeWindow / User API: foregroundWindowGot 477Jump to behavior
            Source: C:\Windows\server.exeWindow / User API: foregroundWindowGot 511Jump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exe TID: 7516Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\server.exe TID: 7704Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\server.exe TID: 7568Thread sleep time: -895000s >= -30000sJump to behavior
            Source: C:\Windows\server.exe TID: 7720Thread sleep time: -740500s >= -30000sJump to behavior
            Source: C:\Windows\server.exe TID: 7568Thread sleep time: -662000s >= -30000sJump to behavior
            Source: C:\Windows\server.exe TID: 7720Thread sleep time: -360500s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exe TID: 8012Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exe TID: 8168Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe TID: 5260Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\server.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Jump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Jump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exeFile opened: C:\Users\user\AppData\Jump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exeFile opened: C:\Users\user\Jump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior
            Source: gReXLT7XjR.exe, 00000000.00000002.1678719492.00000000009B0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\y0
            Source: server.exe, 00000001.00000002.4111234820.0000000001461000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWral, PublicKeyToken=b03f5f7f11d50a3a"/>
            Source: netsh.exe, 00000002.00000003.1695523902.0000000000E12000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000005.00000003.1728881595.0000000000E42000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllg
            Source: netsh.exe, 00000004.00000003.1724790687.00000000008C2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlll
            Source: gReXLT7XjR.exe, 00000000.00000002.1678719492.00000000009B0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}T0HX
            Source: server.exe, 00000001.00000002.4111234820.0000000001461000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Windows\server.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Windows\server.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\gReXLT7XjR.exeProcess created: C:\Windows\server.exe "C:\Windows\server.exe" Jump to behavior
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 19:45:23 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 17:05:13 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 12:35:52 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 16:58:30 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 19:02:22 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 10:45:05 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 21:17:45 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 01:37:47 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 13:29:05 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 21:15:03 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 10:44:33 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 20:56:36 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 02:33:43 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 16:34:16 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 19:47:38 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 18:23:32 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 16:08:03 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 12:37:21 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 16:22:52 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 21:36:20 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 16:38:56 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 06:10:28 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 13:27:07 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 14:01:22 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 19:51:42 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 16:28:53 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 13:27:36 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 03:16:04 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 02:03:03 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 05:23:19 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 04:18:14 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 13:29:34 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 18:41:59 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 14:04:55 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 16:48:19 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 20:27:20 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 14:54:26 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 18:59:11 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 05:34:37 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 19:23:31 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 13:36:52 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 19:57:29 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 10:43:32 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 16:23:28 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 13:50:43 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 21:16:31 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 14:55:59 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 17:12:34 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 04:18:18 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 03:13:03 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 11:07:00 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 18:40:56 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 16:11:25 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 20:56:09 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 11:00:07 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 20:51:36 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 03:12:08 - Program Manager
            Source: server.exe, 00000001.00000002.4113728270.000000000593B000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: ldProgram Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 20:17:38 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 10:10:26 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 02:57:33 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 03:37:57 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 03:16:00 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 17:15:01 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 18:37:05 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 13:30:20 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 19:24:49 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 17:36:21 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 13:32:21 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 13:29:30 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 22:05:20 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 22:06:26 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 19:18:11 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 01:52:55 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 18:30:22 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 18:54:44 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 17:59:45 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 20:23:51 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 03:38:54 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 12:45:15 - Program Manager
            Source: server.exe, 00000001.00000002.4115971762.000000000B069000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: program manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 01:45:35 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 03:10:39 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 20:51:34 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 14:56:42 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 17:05:17 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 10:42:37 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 19:10:57 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 10:54:39 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 16:21:15 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 05:30:33 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 19:57:13 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 16:37:12 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 16:00:05 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 14:32:35 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 18:50:18 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 19:49:30 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 10:57:22 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 18:56:56 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 17:14:33 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 11:49:11 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 01:54:28 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 15:43:51 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 21:03:13 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 05:09:37 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 02:39:55 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 02:30:11 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 13:27:38 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 18:13:31 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 19:28:15 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 18:13:47 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 21:04:17 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 01:54:55 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 10:19:25 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 04:41:43 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 16:20:23 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 13:27:30 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 14:24:40 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 21:49:50 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 19:58:22 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 12:58:10 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 06:02:05 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 15:23:53 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 16:44:06 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 20:11:39 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 03:57:41 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 16:33:48 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 21:16:04 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 17:09:18 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 20:13:53 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 17:36:39 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 20:29:23 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 04:32:29 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 17:36:26 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 17:41:18 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 03:42:46 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 22:05:28 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 19:56:18 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 02:16:04 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 03:41:04 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 18:29:44 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 20:22:53 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 01:46:36 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 21:59:19 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 06:36:00 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 18:38:55 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 15:31:35 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 13:47:59 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 10:11:27 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 14:59:57 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 14:14:44 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 21:20:51 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 05:45:22 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 06:44:49 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 22:05:51 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 04:46:42 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 21:25:51 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 14:46:05 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 14:11:32 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 11:20:16 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 22:05:09 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 14:28:35 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 15:56:03 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 04:22:50 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 16:34:31 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 12:53:40 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 05:02:41 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 22:05:36 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 17:05:25 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 18:42:51 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 15:41:23 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 14:55:22 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 10:43:51 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 14:02:20 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 10:44:50 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 13:28:21 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 18:12:06 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 13:50:15 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 16:14:00 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 18:33:35 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 16:32:27 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 19:15:00 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 03:52:20 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 20:52:01 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 02:57:47 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 14:44:08 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 21:16:16 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 20:45:29 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 14:45:00 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 16:33:22 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 13:29:44 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 01:54:59 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 13:40:16 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 16:57:21 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 19:31:24 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 21:54:02 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 20:40:19 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 20:50:26 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 20:22:46 - Program Manager
            Source: gReXLT7XjR.exe, 00000000.00000002.1679807379.0000000004ECB000.00000004.00000010.00020000.00000000.sdmp, gReXLT7XjR.exe, 00000000.00000002.1679494575.0000000002B33000.00000004.00000800.00020000.00000000.sdmp, gReXLT7XjR.exe, 00000000.00000002.1679494575.0000000002B3A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 13:27:51 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 20:52:03 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 21:23:01 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 14:28:23 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 03:16:12 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 04:17:54 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 11:09:28 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 02:52:57 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 03:37:10 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 12:21:06 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 16:52:27 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 20:59:34 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 14:46:51 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 13:29:15 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 17:38:09 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 14:10:08 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 20:27:34 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 04:31:41 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 19:31:17 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 21:12:13 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 15:46:47 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 05:22:39 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 12:30:41 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 16:27:46 - Program Manager
            Source: DeadMom.exe, 0000000D.00000002.1901603716.000000000555B000.00000004.00000010.00020000.00000000.sdmp, Microsoft Corporation.exe, 00000010.00000002.1998672104.0000000004D6B000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: dProgram Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 05:31:51 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 17:40:32 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 05:32:25 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 13:27:53 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 17:10:22 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 12:35:06 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 20:07:55 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 20:56:24 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 20:35:37 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 17:35:23 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 10:55:05 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 13:21:21 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 17:30:20 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 17:06:13 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 18:08:39 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 01:43:45 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 02:25:20 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 02:29:01 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 16:44:10 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 21:24:50 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 01:37:41 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 16:08:22 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 12:37:15 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 14:59:29 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 05:27:09 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 14:11:43 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 18:28:43 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 13:28:41 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 04:41:14 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 04:51:00 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 06:18:01 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 12:53:32 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 20:56:30 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 15:23:28 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 21:24:37 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 14:59:42 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 10:43:57 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 05:55:36 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 16:32:55 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 17:26:45 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 19:57:01 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 16:32:07 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 18:38:29 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 20:09:20 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 14:48:20 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 03:38:06 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 13:27:26 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 20:23:27 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 15:58:15 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 19:05:16 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 12:14:32 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 02:58:03 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 12:13:50 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 20:07:49 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 11:20:34 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 03:52:07 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 18:19:14 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 13:28:08 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 16:59:52 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 02:00:52 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 14:42:16 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 01:36:52 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 06:22:49 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 19:33:56 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 11:08:58 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 19:13:31 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 19:29:35 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 15:44:28 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 19:41:24 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 13:36:22 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 14:20:07 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 18:49:11 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 14:27:01 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 14:09:40 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 20:59:02 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 19:57:15 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 14:48:34 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 18:26:40 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 19:56:53 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 19:51:30 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 04:18:10 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 20:22:51 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 16:28:13 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 16:44:04 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 20:12:59 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 20:33:39 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 01:28:30 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 01:56:30 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 20:27:28 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 04:02:53 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 01:55:15 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 16:50:02 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 17:33:25 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 03:28:14 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 15:57:49 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 16:12:48 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 21:24:43 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 05:22:24 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 22:02:01 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 13:41:05 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 06:27:06 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 22:08:01 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 17:35:32 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 06:11:02 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 13:24:56 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 14:46:41 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 19:52:31 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 02:15:42 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 15:24:34 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 02:04:57 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 06:34:52 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 21:09:31 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 16:23:32 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 04:13:50 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 21:56:53 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 03:56:51 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 11:12:13 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 19:48:40 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 19:57:07 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 13:38:19 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 22:04:35 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 15:56:14 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 01:55:49 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 12:22:45 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 12:14:29 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 22:00:32 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 19:37:55 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 11:38:06 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 16:33:39 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 19:01:05 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 20:14:16 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 17:12:12 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 05:08:17 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 03:17:26 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 14:19:37 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 18:55:09 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 18:13:28 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 03:38:47 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 16:18:28 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 13:28:10 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 19:51:09 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 10:11:03 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 11:04:51 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 13:36:15 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 18:39:57 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 20:59:28 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 10:45:28 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 02:24:49 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 20:25:03 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 17:36:18 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 17:59:20 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 03:34:01 - Program Manager
            Source: gReXLT7XjR.exe, DeadMom.exe1.1.dr, DeadMom.exe4.1.dr, DeadMom.exe5.1.dr, Microsoft Corporation.exe.1.dr, DeadMom.exe2.1.dr, 445c7762b8f06a76352fcac2e22df159Windows Update.exe.1.dr, DeadMom.exe0.1.dr, server.exe.0.dr, DeadMom.exe3.1.dr, Kaspersky Anti-Virus Flash.exe.1.drBinary or memory string: Shell_traywnd+MostrarBarraDeTarefas
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 17:06:09 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 21:45:37 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 14:23:56 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 21:45:35 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 06:39:20 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 20:56:14 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 17:58:27 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 16:08:28 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 20:37:08 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 06:46:10 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 04:43:09 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 14:31:41 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 18:39:16 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 01:54:49 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 20:27:02 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 13:26:58 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 02:32:09 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 03:44:22 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 16:56:19 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 18:12:25 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 16:33:38 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 17:26:57 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 14:07:45 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 20:08:56 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 11:11:49 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 17:05:20 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 20:09:21 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 20:08:22 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 02:22:36 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 02:30:38 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 18:29:28 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 19:21:27 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 17:05:06 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 03:37:17 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 20:42:38 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 03:07:35 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 20:52:18 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 02:29:02 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 13:27:28 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 10:44:40 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 13:30:47 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 12:36:05 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 13:27:40 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 03:37:06 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 02:12:40 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 12:36:45 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 21:23:40 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 21:45:32 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 04:44:48 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 19:50:36 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 04:33:40 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 13:27:27 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 13:30:06 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 14:48:13 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 22:05:14 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 18:58:06 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 05:46:41 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 18:54:25 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 10:43:25 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 13:49:46 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 21:00:53 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 13:55:50 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 01:50:04 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 11:51:29 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 01:55:17 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 11:32:09 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 04:08:46 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 18:02:36 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 01:44:42 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 13:43:08 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 21:34:48 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 13:10:21 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 13:26:59 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 18:39:57 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 20:50:47 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 05:31:59 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 04:21:11 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 14:41:12 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 14:07:44 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 20:43:53 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 16:35:08 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 22:06:13 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 05:33:46 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 19:31:13 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 05:22:55 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 15:08:21 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 05:32:44 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 13:41:34 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 14:38:57 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 06:18:46 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 04:45:30 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 05:55:48 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 21:56:56 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 01:44:51 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 22:05:11 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 19:23:14 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 03:16:15 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 13:29:45 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 01:26:23 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 15:26:45 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 15:36:31 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 12:56:35 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 20:00:21 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 20:22:07 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 11:17:47 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 05:22:09 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 12:36:10 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 13:32:57 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 19:03:07 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 14:44:56 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 21:48:13 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 14:57:22 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 19:41:41 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 19:43:04 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 11:03:39 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 17:59:03 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 05:56:15 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/28 | 03:00:38 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 21:13:46 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 19:31:20 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/30 | 21:22:22 - Program Manager
            Source: server.exe, 00000001.00000002.4112964031.00000000045D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/12/25 | 13:27:50 - Program Manager
            Source: C:\Windows\SysWOW64\netsh.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\server.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Lowering of HIPS / PFW / Operating System Security Settings

            barindex
            Source: gReXLT7XjR.exe, Fransesco.cs.Net Code: INS
            Source: server.exe.0.dr, Fransesco.cs.Net Code: INS
            Source: DeadMom.exe.1.dr, Fransesco.cs.Net Code: INS
            Source: DeadMom.exe0.1.dr, Fransesco.cs.Net Code: INS
            Source: DeadMom.exe1.1.dr, Fransesco.cs.Net Code: INS
            Source: Kaspersky Anti-Virus Flash.exe.1.dr, Fransesco.cs.Net Code: INS
            Source: DeadMom.exe2.1.dr, Fransesco.cs.Net Code: INS
            Source: Microsoft Corporation.exe.1.dr, Fransesco.cs.Net Code: INS
            Source: 445c7762b8f06a76352fcac2e22df159Windows Update.exe.1.dr, Fransesco.cs.Net Code: INS
            Source: DeadMom.exe3.1.dr, Fransesco.cs.Net Code: INS
            Source: DeadMom.exe4.1.dr, Fransesco.cs.Net Code: INS
            Source: C:\Windows\server.exeRegistry key created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System DisableTaskMgrJump to behavior
            Source: C:\Windows\server.exeRegistry value created: HKEY_CURRENT_USER\Environment SEE_MASK_NOZONECHECKSJump to behavior
            Source: C:\Windows\server.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Windows\server.exe" "server.exe" ENABLE
            Source: C:\Windows\server.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Windows\server.exe" "server.exe" ENABLE

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: gReXLT7XjR.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.gReXLT7XjR.exe.510000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.1679600607.0000000003B08000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000000.1661776984.0000000000512000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.4112787916.00000000034F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: gReXLT7XjR.exe PID: 7496, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: server.exe PID: 7564, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: 445c7762b8f06a76352fcac2e22df159Windows Update.exe PID: 7996, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: DeadMom.exe PID: 8152, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: Microsoft Corporation.exe PID: 4544, type: MEMORYSTR
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exe, type: DROPPED
            Source: Yara matchFile source: C:\Users\user\AppData\Local\DeadMom.exe, type: DROPPED
            Source: Yara matchFile source: C:\Windows\server.exe, type: DROPPED
            Source: Yara matchFile source: C:\Kaspersky Anti-Virus Flash.exe, type: DROPPED
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, type: DROPPED

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: gReXLT7XjR.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.gReXLT7XjR.exe.510000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.1679600607.0000000003B08000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000000.1661776984.0000000000512000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.4112787916.00000000034F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: gReXLT7XjR.exe PID: 7496, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: server.exe PID: 7564, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: 445c7762b8f06a76352fcac2e22df159Windows Update.exe PID: 7996, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: DeadMom.exe PID: 8152, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: Microsoft Corporation.exe PID: 4544, type: MEMORYSTR
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exe, type: DROPPED
            Source: Yara matchFile source: C:\Users\user\AppData\Local\DeadMom.exe, type: DROPPED
            Source: Yara matchFile source: C:\Windows\server.exe, type: DROPPED
            Source: Yara matchFile source: C:\Kaspersky Anti-Virus Flash.exe, type: DROPPED
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, type: DROPPED
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire Infrastructure11
            Replication Through Removable Media
            Windows Management Instrumentation12
            Registry Run Keys / Startup Folder
            1
            Access Token Manipulation
            121
            Masquerading
            OS Credential Dumping11
            Security Software Discovery
            Remote Services1
            Archive Collected Data
            1
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/Job1
            DLL Side-Loading
            12
            Process Injection
            51
            Disable or Modify Tools
            LSASS Memory2
            Process Discovery
            Remote Desktop Protocol1
            Clipboard Data
            1
            Non-Standard Port
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)12
            Registry Run Keys / Startup Folder
            41
            Virtualization/Sandbox Evasion
            Security Account Manager41
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared Drive1
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
            DLL Side-Loading
            1
            Access Token Manipulation
            NTDS1
            Application Window Discovery
            Distributed Component Object ModelInput Capture1
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script12
            Process Injection
            LSA Secrets1
            Peripheral Device Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            Software Packing
            Cached Domain Credentials2
            File and Directory Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            DLL Side-Loading
            DCSync12
            System Information Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1580723 Sample: gReXLT7XjR.exe Startdate: 25/12/2024 Architecture: WINDOWS Score: 100 48 company-telecom.gl.at.ply.gg 2->48 52 Suricata IDS alerts for network traffic 2->52 54 Found malware configuration 2->54 56 Malicious sample detected (through community Yara rule) 2->56 58 12 other signatures 2->58 9 gReXLT7XjR.exe 7 2->9         started        13 Microsoft Corporation.exe 3 2->13         started        15 DeadMom.exe 3 2->15         started        17 2 other processes 2->17 signatures3 process4 file5 44 C:\Windows\server.exe, PE32 9->44 dropped 46 C:\Users\user\AppData\...\gReXLT7XjR.exe.log, ASCII 9->46 dropped 68 Drops executables to the windows directory (C:\Windows) and starts them 9->68 19 server.exe 2 16 9->19         started        signatures6 process7 dnsIp8 50 company-telecom.gl.at.ply.gg 147.185.221.18, 42876, 49730, 49731 SALSGIVERUS United States 19->50 36 C:\Windows\SysWOW64\DeadMom.exe, PE32 19->36 dropped 38 C:\Users\user\Favorites\DeadMom.exe, PE32 19->38 dropped 40 C:\Users\user\...\Microsoft Corporation.exe, PE32 19->40 dropped 42 7 other malicious files 19->42 dropped 60 Antivirus detection for dropped file 19->60 62 Multi AV Scanner detection for dropped file 19->62 64 Machine Learning detection for dropped file 19->64 66 5 other signatures 19->66 24 netsh.exe 2 19->24         started        26 netsh.exe 2 19->26         started        28 netsh.exe 2 19->28         started        file9 signatures10 process11 process12 30 conhost.exe 24->30         started        32 conhost.exe 26->32         started        34 conhost.exe 28->34         started       

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            gReXLT7XjR.exe87%ReversingLabsByteCode-MSIL.Backdoor.njRAT
            gReXLT7XjR.exe70%VirustotalBrowse
            gReXLT7XjR.exe100%AviraTR/Dropper.Gen
            gReXLT7XjR.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\DeadMom.exe100%AviraTR/Dropper.Gen
            C:\Users\user\AppData\Local\DeadMom.exe100%AviraTR/Dropper.Gen
            C:\Users\user\AppData\Local\DeadMom.exe100%AviraTR/Dropper.Gen
            C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe100%AviraTR/Dropper.Gen
            C:\Users\user\AppData\Local\DeadMom.exe100%AviraTR/Dropper.Gen
            C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exe100%AviraTR/Dropper.Gen
            C:\Users\user\AppData\Local\DeadMom.exe100%AviraTR/Dropper.Gen
            C:\Windows\server.exe100%AviraTR/Dropper.Gen
            C:\Users\user\AppData\Local\DeadMom.exe100%AviraTR/Dropper.Gen
            C:\Kaspersky Anti-Virus Flash.exe100%AviraTR/Dropper.Gen
            C:\Users\user\AppData\Local\DeadMom.exe100%AviraTR/Dropper.Gen
            C:\Users\user\AppData\Local\DeadMom.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Local\DeadMom.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Local\DeadMom.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Local\DeadMom.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Local\DeadMom.exe100%Joe Sandbox ML
            C:\Windows\server.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Local\DeadMom.exe100%Joe Sandbox ML
            C:\Kaspersky Anti-Virus Flash.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Local\DeadMom.exe100%Joe Sandbox ML
            C:\Kaspersky Anti-Virus Flash.exe87%ReversingLabsByteCode-MSIL.Backdoor.njRAT
            C:\Users\user\AppData\Local\DeadMom.exe87%ReversingLabsByteCode-MSIL.Backdoor.njRAT
            C:\Users\user\AppData\Local\Microsoft\Windows\History\DeadMom.exe87%ReversingLabsByteCode-MSIL.Backdoor.njRAT
            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\DeadMom.exe87%ReversingLabsByteCode-MSIL.Backdoor.njRAT
            C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\DeadMom.exe87%ReversingLabsByteCode-MSIL.Backdoor.njRAT
            C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exe87%ReversingLabsByteCode-MSIL.Backdoor.njRAT
            C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exe87%ReversingLabsByteCode-MSIL.Backdoor.njRAT
            C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe87%ReversingLabsByteCode-MSIL.Backdoor.njRAT
            C:\Users\user\Favorites\DeadMom.exe87%ReversingLabsByteCode-MSIL.Backdoor.njRAT
            C:\Windows\SysWOW64\DeadMom.exe87%ReversingLabsByteCode-MSIL.Backdoor.njRAT
            C:\Windows\server.exe87%ReversingLabsByteCode-MSIL.Backdoor.njRAT
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            NameIPActiveMaliciousAntivirus DetectionReputation
            company-telecom.gl.at.ply.gg
            147.185.221.18
            truetrue
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              147.185.221.18
              company-telecom.gl.at.ply.ggUnited States
              12087SALSGIVERUStrue
              Joe Sandbox version:41.0.0 Charoite
              Analysis ID:1580723
              Start date and time:2024-12-25 19:26:04 +01:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 8m 51s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:17
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:1
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:gReXLT7XjR.exe
              renamed because original name is a hash value
              Original Sample Name:4951d592fac59ef8005596d2af5d116b.exe
              Detection:MAL
              Classification:mal100.spre.phis.troj.adwa.evad.winEXE@16/19@1/1
              EGA Information:
              • Successful, ratio: 100%
              HCA Information:
              • Successful, ratio: 97%
              • Number of executed functions: 175
              • Number of non-executed functions: 18
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Override analysis time to 240000 for current running targets taking high CPU consumption
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, consent.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
              • Excluded IPs from analysis (whitelisted): 20.109.210.53, 13.107.246.63
              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
              • Not all processes where analyzed, report is missing behavior information
              • Report size exceeded maximum capacity and may have missing behavior information.
              • Report size exceeded maximum capacity and may have missing disassembly code.
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              TimeTypeDescription
              13:27:31API Interceptor198358x Sleep call for process: server.exe modified
              18:26:59AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exe
              18:27:07AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exe
              18:27:16AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              147.185.221.18twE44mm07j.exeGet hashmaliciousXWormBrowse
                YgJ5inWPQO.exeGet hashmaliciousAsyncRAT, XWormBrowse
                  Discordd.exeGet hashmaliciousAsyncRATBrowse
                    Discord2.exeGet hashmaliciousAsyncRATBrowse
                      Discord3.exeGet hashmaliciousAsyncRATBrowse
                        7laJ4zKd8O.exeGet hashmaliciousXWormBrowse
                          Discord.exeGet hashmaliciousAsyncRATBrowse
                            r8k29DBraE.exeGet hashmaliciousXWormBrowse
                              Lr87y2w72r.exeGet hashmaliciousXWormBrowse
                                7LwVrYH7sy.exeGet hashmaliciousXWormBrowse
                                  No context
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  SALSGIVERUS_____.exeGet hashmaliciousDarkCometBrowse
                                  • 147.185.221.23
                                  test.exeGet hashmaliciousDarkCometBrowse
                                  • 147.185.221.24
                                  L363rVr7oL.exeGet hashmaliciousNjratBrowse
                                  • 147.185.221.24
                                  WO.exeGet hashmaliciousMetasploitBrowse
                                  • 147.185.221.23
                                  reddit.exeGet hashmaliciousMetasploitBrowse
                                  • 147.185.221.23
                                  loligang.mpsl.elfGet hashmaliciousMiraiBrowse
                                  • 147.176.119.110
                                  horrify's Modx Menu v1.exeGet hashmaliciousXWormBrowse
                                  • 147.185.221.24
                                  fvbhdyuJYi.exeGet hashmaliciousXWormBrowse
                                  • 147.185.221.24
                                  8DiSW8IPEF.exeGet hashmaliciousXWormBrowse
                                  • 147.185.221.24
                                  twE44mm07j.exeGet hashmaliciousXWormBrowse
                                  • 147.185.221.18
                                  No context
                                  No context
                                  Process:C:\Windows\server.exe
                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):95232
                                  Entropy (8bit):5.561256734534238
                                  Encrypted:false
                                  SSDEEP:1536:ZYduiuNTXfL/AJbZNljEwzGi1dDFDugS:ZYdaTXfL/AhzSi1dJT
                                  MD5:4951D592FAC59EF8005596D2AF5D116B
                                  SHA1:536AB7195AFEFB6C8947A86B10ADB8D0461F7115
                                  SHA-256:EF022F571BBE78532CC1D1D09689470933F629F5E3775929F8926D7B51E6F122
                                  SHA-512:3F551F1B653764DAE9D75DBDF764389786A6004EF2C49F3C7BA81BB4412ADC7C8C3315649E4C5A8F970B3F185F67E6F04BACF1264F233225511D45CB75D20FF1
                                  Malicious:true
                                  Yara Hits:
                                  • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Kaspersky Anti-Virus Flash.exe, Author: Joe Security
                                  • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\Kaspersky Anti-Virus Flash.exe, Author: unknown
                                  • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: C:\Kaspersky Anti-Virus Flash.exe, Author: Florian Roth
                                  • Rule: crimeware_njrat_strings, Description: Detects njRAT based on some strings, Source: C:\Kaspersky Anti-Virus Flash.exe, Author: Sekoia.io
                                  • Rule: Njrat, Description: detect njRAT in memory, Source: C:\Kaspersky Anti-Virus Flash.exe, Author: JPCERT/CC Incident Response Group
                                  • Rule: Njrat, Description: detect njRAT in memory, Source: C:\Kaspersky Anti-Virus Flash.exe, Author: JPCERT/CC Incident Response Group
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Kaspersky Anti-Virus Flash.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Kaspersky Anti-Virus Flash.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Kaspersky Anti-Virus Flash.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Kaspersky Anti-Virus Flash.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Kaspersky Anti-Virus Flash.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Kaspersky Anti-Virus Flash.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Kaspersky Anti-Virus Flash.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Kaspersky Anti-Virus Flash.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Kaspersky Anti-Virus Flash.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Kaspersky Anti-Virus Flash.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Kaspersky Anti-Virus Flash.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Kaspersky Anti-Virus Flash.exe, Author: ditekSHen
                                  Antivirus:
                                  • Antivirus: Avira, Detection: 100%
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: ReversingLabs, Detection: 87%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...bWgg.................p..........N.... ........@.. ....................................@.....................................S.................................................................................... ............... ..H............text...To... ...p.................. ..`.reloc...............r..............@..B........................................................0.......H.......................................................................&.(......**..(......*.s.........s ........s!........s".........*.0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                                  Process:C:\Windows\server.exe
                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):95232
                                  Entropy (8bit):5.561256734534238
                                  Encrypted:false
                                  SSDEEP:1536:ZYduiuNTXfL/AJbZNljEwzGi1dDFDugS:ZYdaTXfL/AhzSi1dJT
                                  MD5:4951D592FAC59EF8005596D2AF5D116B
                                  SHA1:536AB7195AFEFB6C8947A86B10ADB8D0461F7115
                                  SHA-256:EF022F571BBE78532CC1D1D09689470933F629F5E3775929F8926D7B51E6F122
                                  SHA-512:3F551F1B653764DAE9D75DBDF764389786A6004EF2C49F3C7BA81BB4412ADC7C8C3315649E4C5A8F970B3F185F67E6F04BACF1264F233225511D45CB75D20FF1
                                  Malicious:true
                                  Yara Hits:
                                  • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Users\user\AppData\Local\DeadMom.exe, Author: Joe Security
                                  • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\Users\user\AppData\Local\DeadMom.exe, Author: unknown
                                  • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: C:\Users\user\AppData\Local\DeadMom.exe, Author: Florian Roth
                                  • Rule: crimeware_njrat_strings, Description: Detects njRAT based on some strings, Source: C:\Users\user\AppData\Local\DeadMom.exe, Author: Sekoia.io
                                  • Rule: Njrat, Description: detect njRAT in memory, Source: C:\Users\user\AppData\Local\DeadMom.exe, Author: JPCERT/CC Incident Response Group
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Local\DeadMom.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Local\DeadMom.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Local\DeadMom.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Local\DeadMom.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Local\DeadMom.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Local\DeadMom.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Local\DeadMom.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Local\DeadMom.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Local\DeadMom.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Local\DeadMom.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Local\DeadMom.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Local\DeadMom.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Local\DeadMom.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Local\DeadMom.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Local\DeadMom.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Local\DeadMom.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Local\DeadMom.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Local\DeadMom.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Local\DeadMom.exe, Author: ditekSHen
                                  Antivirus:
                                  • Antivirus: Avira, Detection: 100%
                                  • Antivirus: Avira, Detection: 100%
                                  • Antivirus: Avira, Detection: 100%
                                  • Antivirus: Avira, Detection: 100%
                                  • Antivirus: Avira, Detection: 100%
                                  • Antivirus: Avira, Detection: 100%
                                  • Antivirus: Avira, Detection: 100%
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: ReversingLabs, Detection: 87%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...bWgg.................p..........N.... ........@.. ....................................@.....................................S.................................................................................... ............... ..H............text...To... ...p.................. ..`.reloc...............r..............@..B........................................................0.......H.......................................................................&.(......**..(......*.s.........s ........s!........s".........*.0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                                  Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):525
                                  Entropy (8bit):5.259753436570609
                                  Encrypted:false
                                  SSDEEP:12:Q3LaJU2C9XAn10Ug+9pfu9t0U29xtUz1B0U2uk71K6xhk7v:MLF2CpI3zffup29Iz52Ve
                                  MD5:260E01CC001F9C4643CA7A62F395D747
                                  SHA1:492AD0ACE3A9C8736909866EEA168962D418BE5A
                                  SHA-256:4BC52CCF866F489772A6919A0CC2C55B1432729D6BDF29E17E5853ABDFAB6030
                                  SHA-512:01AF7D75257E3DBD460E328F5C057D0367B83D3D9397E89CA3AE54AB9B2842D62352D8CCB4BE98ACE0C5667846759D32C199DE39ECCD0CF9CD6A83267D27E7C4
                                  Malicious:false
                                  Reputation:moderate, very likely benign file
                                  Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\bec14584c93014efbc76285c35d1e891\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\7d443c6c007fe8696f9aa6ff1da53ef7\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\2cdaeaf53e3d49038cf7cb0ce9d805d3\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\d0e5535854cce87ea7f2d69d0594b7a8\System.Windows.Forms.ni.dll",0..
                                  Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):525
                                  Entropy (8bit):5.259753436570609
                                  Encrypted:false
                                  SSDEEP:12:Q3LaJU2C9XAn10Ug+9pfu9t0U29xtUz1B0U2uk71K6xhk7v:MLF2CpI3zffup29Iz52Ve
                                  MD5:260E01CC001F9C4643CA7A62F395D747
                                  SHA1:492AD0ACE3A9C8736909866EEA168962D418BE5A
                                  SHA-256:4BC52CCF866F489772A6919A0CC2C55B1432729D6BDF29E17E5853ABDFAB6030
                                  SHA-512:01AF7D75257E3DBD460E328F5C057D0367B83D3D9397E89CA3AE54AB9B2842D62352D8CCB4BE98ACE0C5667846759D32C199DE39ECCD0CF9CD6A83267D27E7C4
                                  Malicious:false
                                  Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\bec14584c93014efbc76285c35d1e891\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\7d443c6c007fe8696f9aa6ff1da53ef7\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\2cdaeaf53e3d49038cf7cb0ce9d805d3\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\d0e5535854cce87ea7f2d69d0594b7a8\System.Windows.Forms.ni.dll",0..
                                  Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):525
                                  Entropy (8bit):5.259753436570609
                                  Encrypted:false
                                  SSDEEP:12:Q3LaJU2C9XAn10Ug+9pfu9t0U29xtUz1B0U2uk71K6xhk7v:MLF2CpI3zffup29Iz52Ve
                                  MD5:260E01CC001F9C4643CA7A62F395D747
                                  SHA1:492AD0ACE3A9C8736909866EEA168962D418BE5A
                                  SHA-256:4BC52CCF866F489772A6919A0CC2C55B1432729D6BDF29E17E5853ABDFAB6030
                                  SHA-512:01AF7D75257E3DBD460E328F5C057D0367B83D3D9397E89CA3AE54AB9B2842D62352D8CCB4BE98ACE0C5667846759D32C199DE39ECCD0CF9CD6A83267D27E7C4
                                  Malicious:false
                                  Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\bec14584c93014efbc76285c35d1e891\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\7d443c6c007fe8696f9aa6ff1da53ef7\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\2cdaeaf53e3d49038cf7cb0ce9d805d3\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\d0e5535854cce87ea7f2d69d0594b7a8\System.Windows.Forms.ni.dll",0..
                                  Process:C:\Users\user\Desktop\gReXLT7XjR.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):525
                                  Entropy (8bit):5.259753436570609
                                  Encrypted:false
                                  SSDEEP:12:Q3LaJU2C9XAn10Ug+9pfu9t0U29xtUz1B0U2uk71K6xhk7v:MLF2CpI3zffup29Iz52Ve
                                  MD5:260E01CC001F9C4643CA7A62F395D747
                                  SHA1:492AD0ACE3A9C8736909866EEA168962D418BE5A
                                  SHA-256:4BC52CCF866F489772A6919A0CC2C55B1432729D6BDF29E17E5853ABDFAB6030
                                  SHA-512:01AF7D75257E3DBD460E328F5C057D0367B83D3D9397E89CA3AE54AB9B2842D62352D8CCB4BE98ACE0C5667846759D32C199DE39ECCD0CF9CD6A83267D27E7C4
                                  Malicious:true
                                  Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\bec14584c93014efbc76285c35d1e891\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\7d443c6c007fe8696f9aa6ff1da53ef7\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\2cdaeaf53e3d49038cf7cb0ce9d805d3\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\d0e5535854cce87ea7f2d69d0594b7a8\System.Windows.Forms.ni.dll",0..
                                  Process:C:\Windows\server.exe
                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):95232
                                  Entropy (8bit):5.561256734534238
                                  Encrypted:false
                                  SSDEEP:1536:ZYduiuNTXfL/AJbZNljEwzGi1dDFDugS:ZYdaTXfL/AhzSi1dJT
                                  MD5:4951D592FAC59EF8005596D2AF5D116B
                                  SHA1:536AB7195AFEFB6C8947A86B10ADB8D0461F7115
                                  SHA-256:EF022F571BBE78532CC1D1D09689470933F629F5E3775929F8926D7B51E6F122
                                  SHA-512:3F551F1B653764DAE9D75DBDF764389786A6004EF2C49F3C7BA81BB4412ADC7C8C3315649E4C5A8F970B3F185F67E6F04BACF1264F233225511D45CB75D20FF1
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 87%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...bWgg.................p..........N.... ........@.. ....................................@.....................................S.................................................................................... ............... ..H............text...To... ...p.................. ..`.reloc...............r..............@..B........................................................0.......H.......................................................................&.(......**..(......*.s.........s ........s!........s".........*.0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                                  Process:C:\Windows\server.exe
                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):95232
                                  Entropy (8bit):5.561256734534238
                                  Encrypted:false
                                  SSDEEP:1536:ZYduiuNTXfL/AJbZNljEwzGi1dDFDugS:ZYdaTXfL/AhzSi1dJT
                                  MD5:4951D592FAC59EF8005596D2AF5D116B
                                  SHA1:536AB7195AFEFB6C8947A86B10ADB8D0461F7115
                                  SHA-256:EF022F571BBE78532CC1D1D09689470933F629F5E3775929F8926D7B51E6F122
                                  SHA-512:3F551F1B653764DAE9D75DBDF764389786A6004EF2C49F3C7BA81BB4412ADC7C8C3315649E4C5A8F970B3F185F67E6F04BACF1264F233225511D45CB75D20FF1
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 87%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...bWgg.................p..........N.... ........@.. ....................................@.....................................S.................................................................................... ............... ..H............text...To... ...p.................. ..`.reloc...............r..............@..B........................................................0.......H.......................................................................&.(......**..(......*.s.........s ........s!........s".........*.0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                                  Process:C:\Windows\server.exe
                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):95232
                                  Entropy (8bit):5.561256734534238
                                  Encrypted:false
                                  SSDEEP:1536:ZYduiuNTXfL/AJbZNljEwzGi1dDFDugS:ZYdaTXfL/AhzSi1dJT
                                  MD5:4951D592FAC59EF8005596D2AF5D116B
                                  SHA1:536AB7195AFEFB6C8947A86B10ADB8D0461F7115
                                  SHA-256:EF022F571BBE78532CC1D1D09689470933F629F5E3775929F8926D7B51E6F122
                                  SHA-512:3F551F1B653764DAE9D75DBDF764389786A6004EF2C49F3C7BA81BB4412ADC7C8C3315649E4C5A8F970B3F185F67E6F04BACF1264F233225511D45CB75D20FF1
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 87%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...bWgg.................p..........N.... ........@.. ....................................@.....................................S.................................................................................... ............... ..H............text...To... ...p.................. ..`.reloc...............r..............@..B........................................................0.......H.......................................................................&.(......**..(......*.s.........s ........s!........s".........*.0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                                  Process:C:\Windows\server.exe
                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):95232
                                  Entropy (8bit):5.561256734534238
                                  Encrypted:false
                                  SSDEEP:1536:ZYduiuNTXfL/AJbZNljEwzGi1dDFDugS:ZYdaTXfL/AhzSi1dJT
                                  MD5:4951D592FAC59EF8005596D2AF5D116B
                                  SHA1:536AB7195AFEFB6C8947A86B10ADB8D0461F7115
                                  SHA-256:EF022F571BBE78532CC1D1D09689470933F629F5E3775929F8926D7B51E6F122
                                  SHA-512:3F551F1B653764DAE9D75DBDF764389786A6004EF2C49F3C7BA81BB4412ADC7C8C3315649E4C5A8F970B3F185F67E6F04BACF1264F233225511D45CB75D20FF1
                                  Malicious:true
                                  Yara Hits:
                                  • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exe, Author: Joe Security
                                  • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exe, Author: unknown
                                  • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exe, Author: Florian Roth
                                  • Rule: crimeware_njrat_strings, Description: Detects njRAT based on some strings, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exe, Author: Sekoia.io
                                  • Rule: Njrat, Description: detect njRAT in memory, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exe, Author: JPCERT/CC Incident Response Group
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exe, Author: ditekSHen
                                  Antivirus:
                                  • Antivirus: Avira, Detection: 100%
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: ReversingLabs, Detection: 87%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...bWgg.................p..........N.... ........@.. ....................................@.....................................S.................................................................................... ............... ..H............text...To... ...p.................. ..`.reloc...............r..............@..B........................................................0.......H.......................................................................&.(......**..(......*.s.........s ........s!........s".........*.0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                                  Process:C:\Windows\server.exe
                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):95232
                                  Entropy (8bit):5.561256734534238
                                  Encrypted:false
                                  SSDEEP:1536:ZYduiuNTXfL/AJbZNljEwzGi1dDFDugS:ZYdaTXfL/AhzSi1dJT
                                  MD5:4951D592FAC59EF8005596D2AF5D116B
                                  SHA1:536AB7195AFEFB6C8947A86B10ADB8D0461F7115
                                  SHA-256:EF022F571BBE78532CC1D1D09689470933F629F5E3775929F8926D7B51E6F122
                                  SHA-512:3F551F1B653764DAE9D75DBDF764389786A6004EF2C49F3C7BA81BB4412ADC7C8C3315649E4C5A8F970B3F185F67E6F04BACF1264F233225511D45CB75D20FF1
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 87%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...bWgg.................p..........N.... ........@.. ....................................@.....................................S.................................................................................... ............... ..H............text...To... ...p.................. ..`.reloc...............r..............@..B........................................................0.......H.......................................................................&.(......**..(......*.s.........s ........s!........s".........*.0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                                  Process:C:\Windows\server.exe
                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):95232
                                  Entropy (8bit):5.561256734534238
                                  Encrypted:false
                                  SSDEEP:1536:ZYduiuNTXfL/AJbZNljEwzGi1dDFDugS:ZYdaTXfL/AhzSi1dJT
                                  MD5:4951D592FAC59EF8005596D2AF5D116B
                                  SHA1:536AB7195AFEFB6C8947A86B10ADB8D0461F7115
                                  SHA-256:EF022F571BBE78532CC1D1D09689470933F629F5E3775929F8926D7B51E6F122
                                  SHA-512:3F551F1B653764DAE9D75DBDF764389786A6004EF2C49F3C7BA81BB4412ADC7C8C3315649E4C5A8F970B3F185F67E6F04BACF1264F233225511D45CB75D20FF1
                                  Malicious:true
                                  Yara Hits:
                                  • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, Author: Joe Security
                                  • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, Author: unknown
                                  • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, Author: Florian Roth
                                  • Rule: crimeware_njrat_strings, Description: Detects njRAT based on some strings, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, Author: Sekoia.io
                                  • Rule: crimeware_njrat_strings, Description: Detects njRAT based on some strings, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, Author: Sekoia.io
                                  • Rule: Njrat, Description: detect njRAT in memory, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, Author: JPCERT/CC Incident Response Group
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, Author: ditekSHen
                                  Antivirus:
                                  • Antivirus: Avira, Detection: 100%
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: ReversingLabs, Detection: 87%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...bWgg.................p..........N.... ........@.. ....................................@.....................................S.................................................................................... ............... ..H............text...To... ...p.................. ..`.reloc...............r..............@..B........................................................0.......H.......................................................................&.(......**..(......*.s.........s ........s!........s".........*.0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                                  Process:C:\Users\user\Desktop\gReXLT7XjR.exe
                                  File Type:Unicode text, UTF-8 (with BOM) text, with no line terminators
                                  Category:dropped
                                  Size (bytes):5
                                  Entropy (8bit):2.321928094887362
                                  Encrypted:false
                                  SSDEEP:3:j:j
                                  MD5:CAC4598FDC0F92181616D12833EB6CA1
                                  SHA1:80A7B7A46A0E8E674B782B9EB569E5430A69C84B
                                  SHA-256:275918973C23AD700F278C69CC03C9C82EC9F4D9ED0F53111AD22BEC197FF440
                                  SHA-512:01A7556BFCCE6D9D8251AADC7F6E6169FDD0477D487CE88729C44BFE8B85B2EEE500985D553C0479765EF5B5C6DC3517C0305EFB9089814C3F8A9EA6FC51C713
                                  Malicious:false
                                  Preview:.25
                                  Process:C:\Windows\server.exe
                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):95232
                                  Entropy (8bit):5.561256734534238
                                  Encrypted:false
                                  SSDEEP:1536:ZYduiuNTXfL/AJbZNljEwzGi1dDFDugS:ZYdaTXfL/AhzSi1dJT
                                  MD5:4951D592FAC59EF8005596D2AF5D116B
                                  SHA1:536AB7195AFEFB6C8947A86B10ADB8D0461F7115
                                  SHA-256:EF022F571BBE78532CC1D1D09689470933F629F5E3775929F8926D7B51E6F122
                                  SHA-512:3F551F1B653764DAE9D75DBDF764389786A6004EF2C49F3C7BA81BB4412ADC7C8C3315649E4C5A8F970B3F185F67E6F04BACF1264F233225511D45CB75D20FF1
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 87%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...bWgg.................p..........N.... ........@.. ....................................@.....................................S.................................................................................... ............... ..H............text...To... ...p.................. ..`.reloc...............r..............@..B........................................................0.......H.......................................................................&.(......**..(......*.s.........s ........s!........s".........*.0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                                  Process:C:\Windows\server.exe
                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):95232
                                  Entropy (8bit):5.561256734534238
                                  Encrypted:false
                                  SSDEEP:1536:ZYduiuNTXfL/AJbZNljEwzGi1dDFDugS:ZYdaTXfL/AhzSi1dJT
                                  MD5:4951D592FAC59EF8005596D2AF5D116B
                                  SHA1:536AB7195AFEFB6C8947A86B10ADB8D0461F7115
                                  SHA-256:EF022F571BBE78532CC1D1D09689470933F629F5E3775929F8926D7B51E6F122
                                  SHA-512:3F551F1B653764DAE9D75DBDF764389786A6004EF2C49F3C7BA81BB4412ADC7C8C3315649E4C5A8F970B3F185F67E6F04BACF1264F233225511D45CB75D20FF1
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 87%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...bWgg.................p..........N.... ........@.. ....................................@.....................................S.................................................................................... ............... ..H............text...To... ...p.................. ..`.reloc...............r..............@..B........................................................0.......H.......................................................................&.(......**..(......*.s.........s ........s!........s".........*.0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                                  Process:C:\Users\user\Desktop\gReXLT7XjR.exe
                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):95232
                                  Entropy (8bit):5.561256734534238
                                  Encrypted:false
                                  SSDEEP:1536:ZYduiuNTXfL/AJbZNljEwzGi1dDFDugS:ZYdaTXfL/AhzSi1dJT
                                  MD5:4951D592FAC59EF8005596D2AF5D116B
                                  SHA1:536AB7195AFEFB6C8947A86B10ADB8D0461F7115
                                  SHA-256:EF022F571BBE78532CC1D1D09689470933F629F5E3775929F8926D7B51E6F122
                                  SHA-512:3F551F1B653764DAE9D75DBDF764389786A6004EF2C49F3C7BA81BB4412ADC7C8C3315649E4C5A8F970B3F185F67E6F04BACF1264F233225511D45CB75D20FF1
                                  Malicious:true
                                  Yara Hits:
                                  • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Windows\server.exe, Author: Joe Security
                                  • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\Windows\server.exe, Author: unknown
                                  • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: C:\Windows\server.exe, Author: Florian Roth
                                  • Rule: crimeware_njrat_strings, Description: Detects njRAT based on some strings, Source: C:\Windows\server.exe, Author: Sekoia.io
                                  • Rule: Njrat, Description: detect njRAT in memory, Source: C:\Windows\server.exe, Author: JPCERT/CC Incident Response Group
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Windows\server.exe, Author: ditekSHen
                                  Antivirus:
                                  • Antivirus: Avira, Detection: 100%
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: ReversingLabs, Detection: 87%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...bWgg.................p..........N.... ........@.. ....................................@.....................................S.................................................................................... ............... ..H............text...To... ...p.................. ..`.reloc...............r..............@..B........................................................0.......H.......................................................................&.(......**..(......*.s.........s ........s!........s".........*.0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                                  Process:C:\Windows\SysWOW64\netsh.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):313
                                  Entropy (8bit):4.971939296804078
                                  Encrypted:false
                                  SSDEEP:6:/ojfKsUTGN8Ypox42k9L+DbGMKeQE+vigqAZs2E+AYeDPO+Yswyha:wjPIGNrkHk9iaeIM6ADDPOHyha
                                  MD5:689E2126A85BF55121488295EE068FA1
                                  SHA1:09BAAA253A49D80C18326DFBCA106551EBF22DD6
                                  SHA-256:D968A966EF474068E41256321F77807A042F1965744633D37A203A705662EC25
                                  SHA-512:C3736A8FC7E6573FA1B26FE6A901C05EE85C55A4A276F8F569D9EADC9A58BEC507D1BB90DBF9EA62AE79A6783178C69304187D6B90441D82E46F5F56172B5C5C
                                  Malicious:false
                                  Preview:..IMPORTANT: Command executed successfully...However, "netsh firewall" is deprecated;..use "netsh advfirewall firewall" instead...For more information on using "netsh advfirewall firewall" commands..instead of "netsh firewall", see KB article 947709..at https://go.microsoft.com/fwlink/?linkid=121488 .....Ok.....
                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Entropy (8bit):5.561256734534238
                                  TrID:
                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                  • Win32 Executable (generic) a (10002005/4) 49.75%
                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                  • Windows Screen Saver (13104/52) 0.07%
                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                  File name:gReXLT7XjR.exe
                                  File size:95'232 bytes
                                  MD5:4951d592fac59ef8005596d2af5d116b
                                  SHA1:536ab7195afefb6c8947a86b10adb8d0461f7115
                                  SHA256:ef022f571bbe78532cc1d1d09689470933f629f5e3775929f8926d7b51e6f122
                                  SHA512:3f551f1b653764dae9d75dbdf764389786a6004ef2c49f3c7ba81bb4412adc7c8c3315649e4c5a8f970b3f185f67e6f04bacf1264f233225511d45cb75d20ff1
                                  SSDEEP:1536:ZYduiuNTXfL/AJbZNljEwzGi1dDFDugS:ZYdaTXfL/AhzSi1dJT
                                  TLSH:E993E84977E96524E0BF56F75871F2005E34F44B1602E39E49F219EA0A33AC44F89FEA
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...bWgg.................p..........N.... ........@.. ....................................@................................
                                  Icon Hash:90cececece8e8eb0
                                  Entrypoint:0x418f4e
                                  Entrypoint Section:.text
                                  Digitally signed:false
                                  Imagebase:0x400000
                                  Subsystem:windows gui
                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                  Time Stamp:0x67675762 [Sun Dec 22 00:03:46 2024 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:4
                                  OS Version Minor:0
                                  File Version Major:4
                                  File Version Minor:0
                                  Subsystem Version Major:4
                                  Subsystem Version Minor:0
                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                  Instruction
                                  jmp dword ptr [00402000h]
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x18ef80x53.text
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x1a0000xc.reloc
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x20000x16f540x17000f8aca29152d16cfd818c0c88d14f4c01False0.3685249660326087data5.59291696116443IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .reloc0x1a0000xc0x200dddee5b48052d5dc59ff07bd5a224610False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                  DLLImport
                                  mscoree.dll_CorExeMain
                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                  2024-12-25T19:27:01.311411+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.449730147.185.221.1842876TCP
                                  2024-12-25T19:27:01.311411+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.449730147.185.221.1842876TCP
                                  2024-12-25T19:27:04.782030+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.449731147.185.221.1842876TCP
                                  2024-12-25T19:27:04.782030+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.449731147.185.221.1842876TCP
                                  2024-12-25T19:27:08.629357+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.449732147.185.221.1842876TCP
                                  2024-12-25T19:27:08.629357+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.449732147.185.221.1842876TCP
                                  2024-12-25T19:27:12.521222+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.449733147.185.221.1842876TCP
                                  2024-12-25T19:27:12.521222+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.449733147.185.221.1842876TCP
                                  2024-12-25T19:27:16.605337+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.449736147.185.221.1842876TCP
                                  2024-12-25T19:27:16.605337+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.449736147.185.221.1842876TCP
                                  2024-12-25T19:27:20.441669+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.449740147.185.221.1842876TCP
                                  2024-12-25T19:27:20.441669+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.449740147.185.221.1842876TCP
                                  2024-12-25T19:27:24.279456+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.449742147.185.221.1842876TCP
                                  2024-12-25T19:27:24.279456+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.449742147.185.221.1842876TCP
                                  2024-12-25T19:27:28.109295+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.449743147.185.221.1842876TCP
                                  2024-12-25T19:27:28.109295+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.449743147.185.221.1842876TCP
                                  2024-12-25T19:27:31.985928+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.449744147.185.221.1842876TCP
                                  2024-12-25T19:27:31.985928+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.449744147.185.221.1842876TCP
                                  2024-12-25T19:27:32.633274+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.449744147.185.221.1842876TCP
                                  2024-12-25T19:27:35.816452+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.449745147.185.221.1842876TCP
                                  2024-12-25T19:27:35.816452+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.449745147.185.221.1842876TCP
                                  2024-12-25T19:27:39.671891+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.449746147.185.221.1842876TCP
                                  2024-12-25T19:27:39.671891+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.449746147.185.221.1842876TCP
                                  2024-12-25T19:27:43.502795+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.449747147.185.221.1842876TCP
                                  2024-12-25T19:27:43.502795+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.449747147.185.221.1842876TCP
                                  2024-12-25T19:27:45.137550+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.449747147.185.221.1842876TCP
                                  2024-12-25T19:27:47.381066+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.449748147.185.221.1842876TCP
                                  2024-12-25T19:27:47.381066+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.449748147.185.221.1842876TCP
                                  2024-12-25T19:27:51.416703+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.449749147.185.221.1842876TCP
                                  2024-12-25T19:27:51.416703+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.449749147.185.221.1842876TCP
                                  2024-12-25T19:27:52.530998+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.449749147.185.221.1842876TCP
                                  2024-12-25T19:27:55.256662+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.449751147.185.221.1842876TCP
                                  2024-12-25T19:27:55.256662+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.449751147.185.221.1842876TCP
                                  2024-12-25T19:27:59.110643+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.449763147.185.221.1842876TCP
                                  2024-12-25T19:27:59.110643+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.449763147.185.221.1842876TCP
                                  2024-12-25T19:28:00.056725+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.449763147.185.221.1842876TCP
                                  2024-12-25T19:28:02.984793+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.449769147.185.221.1842876TCP
                                  2024-12-25T19:28:02.984793+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.449769147.185.221.1842876TCP
                                  2024-12-25T19:28:03.452295+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.449769147.185.221.1842876TCP
                                  2024-12-25T19:28:06.673988+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.449779147.185.221.1842876TCP
                                  2024-12-25T19:28:06.673988+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.449779147.185.221.1842876TCP
                                  2024-12-25T19:28:06.916756+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.449779147.185.221.1842876TCP
                                  2024-12-25T19:28:10.290338+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.449789147.185.221.1842876TCP
                                  2024-12-25T19:28:10.290338+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.449789147.185.221.1842876TCP
                                  2024-12-25T19:28:13.798520+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.449796147.185.221.1842876TCP
                                  2024-12-25T19:28:13.798520+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.449796147.185.221.1842876TCP
                                  2024-12-25T19:28:17.435879+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.449806147.185.221.1842876TCP
                                  2024-12-25T19:28:17.435879+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.449806147.185.221.1842876TCP
                                  2024-12-25T19:28:20.742541+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.449813147.185.221.1842876TCP
                                  2024-12-25T19:28:20.742541+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.449813147.185.221.1842876TCP
                                  2024-12-25T19:28:23.895442+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.449823147.185.221.1842876TCP
                                  2024-12-25T19:28:23.895442+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.449823147.185.221.1842876TCP
                                  2024-12-25T19:28:27.015106+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.449830147.185.221.1842876TCP
                                  2024-12-25T19:28:27.015106+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.449830147.185.221.1842876TCP
                                  2024-12-25T19:28:30.031254+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.449836147.185.221.1842876TCP
                                  2024-12-25T19:28:30.031254+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.449836147.185.221.1842876TCP
                                  2024-12-25T19:28:56.960211+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.449893147.185.221.1842876TCP
                                  2024-12-25T19:28:56.960211+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.449893147.185.221.1842876TCP
                                  2024-12-25T19:28:59.828732+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.449902147.185.221.1842876TCP
                                  2024-12-25T19:28:59.828732+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.449902147.185.221.1842876TCP
                                  2024-12-25T19:29:02.596571+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.449909147.185.221.1842876TCP
                                  2024-12-25T19:29:02.596571+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.449909147.185.221.1842876TCP
                                  2024-12-25T19:29:05.380948+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.449915147.185.221.1842876TCP
                                  2024-12-25T19:29:05.380948+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.449915147.185.221.1842876TCP
                                  2024-12-25T19:29:08.464794+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.449921147.185.221.1842876TCP
                                  2024-12-25T19:29:08.464794+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.449921147.185.221.1842876TCP
                                  2024-12-25T19:29:11.059281+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.449927147.185.221.1842876TCP
                                  2024-12-25T19:29:11.059281+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.449927147.185.221.1842876TCP
                                  2024-12-25T19:29:12.016440+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.449927147.185.221.1842876TCP
                                  2024-12-25T19:29:13.563423+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.449933147.185.221.1842876TCP
                                  2024-12-25T19:29:13.563423+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.449933147.185.221.1842876TCP
                                  2024-12-25T19:29:16.067195+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.449940147.185.221.1842876TCP
                                  2024-12-25T19:29:16.067195+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.449940147.185.221.1842876TCP
                                  2024-12-25T19:29:17.797691+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.449940147.185.221.1842876TCP
                                  2024-12-25T19:29:18.553373+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.449947147.185.221.1842876TCP
                                  2024-12-25T19:29:18.553373+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.449947147.185.221.1842876TCP
                                  2024-12-25T19:29:19.739101+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.449947147.185.221.1842876TCP
                                  2024-12-25T19:29:21.005336+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.449954147.185.221.1842876TCP
                                  2024-12-25T19:29:21.005336+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.449954147.185.221.1842876TCP
                                  2024-12-25T19:29:21.315622+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.449954147.185.221.1842876TCP
                                  2024-12-25T19:29:23.394832+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.449960147.185.221.1842876TCP
                                  2024-12-25T19:29:23.394832+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.449960147.185.221.1842876TCP
                                  2024-12-25T19:29:23.636305+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.449960147.185.221.1842876TCP
                                  2024-12-25T19:29:25.827890+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.449966147.185.221.1842876TCP
                                  2024-12-25T19:29:25.827890+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.449966147.185.221.1842876TCP
                                  2024-12-25T19:29:26.234384+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.449966147.185.221.1842876TCP
                                  2024-12-25T19:29:28.796450+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.449972147.185.221.1842876TCP
                                  2024-12-25T19:29:28.796450+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.449972147.185.221.1842876TCP
                                  2024-12-25T19:29:29.140402+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.449972147.185.221.1842876TCP
                                  2024-12-25T19:29:31.016652+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.449977147.185.221.1842876TCP
                                  2024-12-25T19:29:31.016652+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.449977147.185.221.1842876TCP
                                  2024-12-25T19:29:31.258357+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.449977147.185.221.1842876TCP
                                  2024-12-25T19:29:33.308343+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.449983147.185.221.1842876TCP
                                  2024-12-25T19:29:33.308343+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.449983147.185.221.1842876TCP
                                  2024-12-25T19:29:35.532168+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.449989147.185.221.1842876TCP
                                  2024-12-25T19:29:35.532168+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.449989147.185.221.1842876TCP
                                  2024-12-25T19:29:37.713030+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.449995147.185.221.1842876TCP
                                  2024-12-25T19:29:37.713030+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.449995147.185.221.1842876TCP
                                  2024-12-25T19:29:39.891898+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.450001147.185.221.1842876TCP
                                  2024-12-25T19:29:39.891898+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.450001147.185.221.1842876TCP
                                  2024-12-25T19:29:42.069274+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.450007147.185.221.1842876TCP
                                  2024-12-25T19:29:42.069274+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.450007147.185.221.1842876TCP
                                  2024-12-25T19:29:42.317709+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.450007147.185.221.1842876TCP
                                  2024-12-25T19:29:44.227018+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.450013147.185.221.1842876TCP
                                  2024-12-25T19:29:44.227018+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.450013147.185.221.1842876TCP
                                  2024-12-25T19:29:46.487974+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.450019147.185.221.1842876TCP
                                  2024-12-25T19:29:46.487974+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.450019147.185.221.1842876TCP
                                  2024-12-25T19:29:48.630910+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.450024147.185.221.1842876TCP
                                  2024-12-25T19:29:48.630910+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.450024147.185.221.1842876TCP
                                  2024-12-25T19:29:50.710170+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.450030147.185.221.1842876TCP
                                  2024-12-25T19:29:50.710170+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.450030147.185.221.1842876TCP
                                  2024-12-25T19:29:52.763223+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.450036147.185.221.1842876TCP
                                  2024-12-25T19:29:52.763223+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.450036147.185.221.1842876TCP
                                  2024-12-25T19:29:54.859952+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.450040147.185.221.1842876TCP
                                  2024-12-25T19:29:54.859952+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.450040147.185.221.1842876TCP
                                  2024-12-25T19:29:56.943978+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.450046147.185.221.1842876TCP
                                  2024-12-25T19:29:56.943978+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.450046147.185.221.1842876TCP
                                  2024-12-25T19:29:59.035178+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.450051147.185.221.1842876TCP
                                  2024-12-25T19:29:59.035178+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.450051147.185.221.1842876TCP
                                  2024-12-25T19:30:01.060620+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.450054147.185.221.1842876TCP
                                  2024-12-25T19:30:01.060620+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.450054147.185.221.1842876TCP
                                  2024-12-25T19:30:03.136417+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.450055147.185.221.1842876TCP
                                  2024-12-25T19:30:03.136417+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.450055147.185.221.1842876TCP
                                  2024-12-25T19:30:05.144405+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.450056147.185.221.1842876TCP
                                  2024-12-25T19:30:05.144405+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.450056147.185.221.1842876TCP
                                  2024-12-25T19:30:05.384843+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.450056147.185.221.1842876TCP
                                  2024-12-25T19:30:07.114444+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.450057147.185.221.1842876TCP
                                  2024-12-25T19:30:07.114444+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.450057147.185.221.1842876TCP
                                  2024-12-25T19:30:09.158428+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.450058147.185.221.1842876TCP
                                  2024-12-25T19:30:09.158428+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.450058147.185.221.1842876TCP
                                  2024-12-25T19:30:11.116363+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.450059147.185.221.1842876TCP
                                  2024-12-25T19:30:11.116363+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.450059147.185.221.1842876TCP
                                  2024-12-25T19:30:13.048197+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.450060147.185.221.1842876TCP
                                  2024-12-25T19:30:13.048197+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.450060147.185.221.1842876TCP
                                  2024-12-25T19:30:15.023097+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.450061147.185.221.1842876TCP
                                  2024-12-25T19:30:15.023097+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.450061147.185.221.1842876TCP
                                  2024-12-25T19:30:15.803404+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.450061147.185.221.1842876TCP
                                  2024-12-25T19:30:17.017306+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.450062147.185.221.1842876TCP
                                  2024-12-25T19:30:17.017306+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.450062147.185.221.1842876TCP
                                  2024-12-25T19:30:18.970100+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.450063147.185.221.1842876TCP
                                  2024-12-25T19:30:18.970100+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.450063147.185.221.1842876TCP
                                  2024-12-25T19:30:21.064635+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.450064147.185.221.1842876TCP
                                  2024-12-25T19:30:21.064635+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.450064147.185.221.1842876TCP
                                  2024-12-25T19:30:23.067903+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.450065147.185.221.1842876TCP
                                  2024-12-25T19:30:23.067903+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.450065147.185.221.1842876TCP
                                  2024-12-25T19:30:24.909726+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.450066147.185.221.1842876TCP
                                  2024-12-25T19:30:24.909726+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.450066147.185.221.1842876TCP
                                  2024-12-25T19:30:26.800683+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.450067147.185.221.1842876TCP
                                  2024-12-25T19:30:26.800683+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.450067147.185.221.1842876TCP
                                  2024-12-25T19:30:28.697052+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.450068147.185.221.1842876TCP
                                  2024-12-25T19:30:28.697052+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.450068147.185.221.1842876TCP
                                  2024-12-25T19:30:30.621315+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.450069147.185.221.1842876TCP
                                  2024-12-25T19:30:30.621315+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.450069147.185.221.1842876TCP
                                  2024-12-25T19:30:32.505468+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.450070147.185.221.1842876TCP
                                  2024-12-25T19:30:32.505468+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.450070147.185.221.1842876TCP
                                  2024-12-25T19:30:34.395945+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.450071147.185.221.1842876TCP
                                  2024-12-25T19:30:34.395945+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.450071147.185.221.1842876TCP
                                  2024-12-25T19:30:36.284419+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.450072147.185.221.1842876TCP
                                  2024-12-25T19:30:36.284419+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.450072147.185.221.1842876TCP
                                  2024-12-25T19:30:38.189590+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.450073147.185.221.1842876TCP
                                  2024-12-25T19:30:38.189590+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.450073147.185.221.1842876TCP
                                  2024-12-25T19:30:40.087676+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.450074147.185.221.1842876TCP
                                  2024-12-25T19:30:40.087676+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.450074147.185.221.1842876TCP
                                  2024-12-25T19:30:42.007971+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.450075147.185.221.1842876TCP
                                  2024-12-25T19:30:42.007971+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.450075147.185.221.1842876TCP
                                  2024-12-25T19:30:43.888278+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.450076147.185.221.1842876TCP
                                  2024-12-25T19:30:43.888278+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.450076147.185.221.1842876TCP
                                  2024-12-25T19:30:45.782984+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.450077147.185.221.1842876TCP
                                  2024-12-25T19:30:45.782984+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.450077147.185.221.1842876TCP
                                  2024-12-25T19:30:47.647823+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.450078147.185.221.1842876TCP
                                  2024-12-25T19:30:47.647823+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.450078147.185.221.1842876TCP
                                  2024-12-25T19:30:48.135698+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.450078147.185.221.1842876TCP
                                  2024-12-25T19:30:49.548519+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.450079147.185.221.1842876TCP
                                  2024-12-25T19:30:49.548519+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.450079147.185.221.1842876TCP
                                  2024-12-25T19:30:51.409873+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.450080147.185.221.1842876TCP
                                  2024-12-25T19:30:51.409873+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.450080147.185.221.1842876TCP
                                  2024-12-25T19:30:53.339640+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.450081147.185.221.1842876TCP
                                  2024-12-25T19:30:53.339640+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.450081147.185.221.1842876TCP
                                  2024-12-25T19:30:55.232783+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.450082147.185.221.1842876TCP
                                  2024-12-25T19:30:55.232783+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.450082147.185.221.1842876TCP
                                  2024-12-25T19:30:56.291850+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.450082147.185.221.1842876TCP
                                  2024-12-25T19:30:57.111374+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.450083147.185.221.1842876TCP
                                  2024-12-25T19:30:57.111374+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.450083147.185.221.1842876TCP
                                  2024-12-25T19:30:58.988654+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.450084147.185.221.1842876TCP
                                  2024-12-25T19:30:58.988654+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.450084147.185.221.1842876TCP
                                  TimestampSource PortDest PortSource IPDest IP
                                  Dec 25, 2024 19:27:00.715389967 CET4973042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:00.837404013 CET4287649730147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:00.837512970 CET4973042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:01.311410904 CET4973042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:01.432539940 CET4287649730147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:01.432605028 CET4973042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:01.553119898 CET4287649730147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:02.589032888 CET4287649730147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:02.589108944 CET4973042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:04.616844893 CET4973042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:04.618122101 CET4973142876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:04.739356995 CET4287649730147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:04.740324974 CET4287649731147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:04.740402937 CET4973142876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:04.782030106 CET4973142876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:04.901801109 CET4287649731147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:04.901913881 CET4973142876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:05.023078918 CET4287649731147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:06.478001118 CET4287649731147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:06.478096008 CET4973142876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:08.488091946 CET4973142876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:08.508174896 CET4973242876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:08.608361006 CET4287649731147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:08.627928019 CET4287649732147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:08.628154039 CET4973242876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:08.629357100 CET4973242876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:08.751368999 CET4287649732147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:08.751579046 CET4973242876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:08.875699997 CET4287649732147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:10.352971077 CET4287649732147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:10.353094101 CET4973242876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:12.363367081 CET4973242876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:12.364522934 CET4973342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:12.489890099 CET4287649732147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:12.490920067 CET4287649733147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:12.491002083 CET4973342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:12.521222115 CET4973342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:12.645080090 CET4287649733147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:12.645149946 CET4973342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:12.765075922 CET4287649733147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:14.213239908 CET4287649733147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:14.213438034 CET4973342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:16.224564075 CET4973342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:16.363591909 CET4973642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:16.604618073 CET4287649733147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:16.604665995 CET4287649736147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:16.604748964 CET4973642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:16.605336905 CET4973642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:16.725470066 CET4287649736147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:16.725532055 CET4973642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:16.849850893 CET4287649736147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:18.291100979 CET4287649736147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:18.295161963 CET4973642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:20.315458059 CET4973642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:20.316293955 CET4974042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:20.440351963 CET4287649736147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:20.441086054 CET4287649740147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:20.441148996 CET4974042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:20.441668987 CET4974042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:20.564954996 CET4287649740147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:20.565455914 CET4974042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:20.685165882 CET4287649740147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:22.135809898 CET4287649740147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:22.139287949 CET4974042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:24.144633055 CET4974042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:24.152303934 CET4974242876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:24.276109934 CET4287649740147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:24.276125908 CET4287649742147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:24.276289940 CET4974242876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:24.279455900 CET4974242876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:24.400325060 CET4287649742147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:24.400485039 CET4974242876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:24.520777941 CET4287649742147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:25.977650881 CET4287649742147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:25.979206085 CET4974242876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:27.987992048 CET4974242876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:27.988950014 CET4974342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:28.108071089 CET4287649742147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:28.108788013 CET4287649743147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:28.108896971 CET4974342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:28.109294891 CET4974342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:28.229722023 CET4287649743147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:28.229793072 CET4974342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:28.349683046 CET4287649743147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:29.820729971 CET4287649743147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:29.820982933 CET4974342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:31.863437891 CET4974342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:31.864269018 CET4974442876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:31.984926939 CET4287649743147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:31.985141039 CET4287649744147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:31.985250950 CET4974442876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:31.985928059 CET4974442876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:32.105496883 CET4287649744147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:32.110636950 CET4974442876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:32.230665922 CET4287649744147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:32.633274078 CET4974442876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:32.752988100 CET4287649744147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:33.682449102 CET4287649744147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:33.682507992 CET4974442876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:35.691119909 CET4974442876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:35.691881895 CET4974542876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:35.814963102 CET4287649744147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:35.815781116 CET4287649745147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:35.815885067 CET4974542876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:35.816452026 CET4974542876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:35.939373970 CET4287649745147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:35.939471006 CET4974542876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:36.061973095 CET4287649745147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:37.543595076 CET4287649745147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:37.543682098 CET4974542876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:39.550590038 CET4974542876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:39.551450014 CET4974642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:39.670751095 CET4287649745147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:39.671051025 CET4287649746147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:39.671125889 CET4974642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:39.671890974 CET4974642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:39.792956114 CET4287649746147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:39.793076992 CET4974642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:39.916816950 CET4287649746147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:41.370229959 CET4287649746147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:41.370316029 CET4974642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:43.378798008 CET4974642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:43.379631996 CET4974742876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:43.501271009 CET4287649746147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:43.501720905 CET4287649747147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:43.501806974 CET4974742876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:43.502794981 CET4974742876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:43.622785091 CET4287649747147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:43.622993946 CET4974742876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:43.747673988 CET4287649747147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:45.137550116 CET4974742876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:45.241034031 CET4287649747147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:45.241309881 CET4974742876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:45.259490967 CET4287649747147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:45.361308098 CET4287649747147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:47.254496098 CET4974842876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:47.380510092 CET4287649748147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:47.380707026 CET4974842876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:47.381066084 CET4974842876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:47.695230961 CET4287649748147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:47.695405960 CET4974842876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:47.815202951 CET4287649748147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:49.276058912 CET4287649748147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:49.276154995 CET4974842876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:51.292117119 CET4974842876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:51.293504953 CET4974942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:51.414601088 CET4287649748147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:51.415704966 CET4287649749147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:51.415834904 CET4974942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:51.416702986 CET4974942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:51.543205023 CET4287649749147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:51.543262005 CET4974942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:51.669198036 CET4287649749147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:52.530997992 CET4974942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:52.651949883 CET4287649749147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:53.119466066 CET4287649749147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:53.119549036 CET4974942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:55.128880978 CET4974942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:55.129815102 CET4975142876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:55.254823923 CET4287649749147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:55.255845070 CET4287649751147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:55.255920887 CET4975142876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:55.256661892 CET4975142876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:55.376339912 CET4287649751147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:55.376456022 CET4975142876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:55.496438980 CET4287649751147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:56.978615046 CET4287649751147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:56.978873014 CET4975142876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:58.988246918 CET4975142876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:58.989203930 CET4976342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:59.108973980 CET4287649751147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:59.109731913 CET4287649763147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:59.109838963 CET4976342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:59.110642910 CET4976342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:59.230098009 CET4287649763147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:27:59.230187893 CET4976342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:27:59.349880934 CET4287649763147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:28:00.056725025 CET4976342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:00.183350086 CET4287649763147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:28:00.855138063 CET4287649763147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:28:00.855235100 CET4976342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:02.863723040 CET4976342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:02.864550114 CET4976942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:02.983441114 CET4287649763147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:28:02.983997107 CET4287649769147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:28:02.984069109 CET4976942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:02.984792948 CET4976942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:03.104496956 CET4287649769147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:28:03.104566097 CET4976942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:03.225585938 CET4287649769147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:28:03.452295065 CET4976942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:03.577277899 CET4287649769147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:28:04.682301998 CET4287649769147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:28:04.682380915 CET4976942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:06.552558899 CET4976942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:06.553432941 CET4977942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:06.672189951 CET4287649769147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:28:06.673039913 CET4287649779147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:28:06.673219919 CET4977942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:06.673988104 CET4977942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:06.795509100 CET4287649779147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:28:06.795573950 CET4977942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:06.916685104 CET4287649779147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:28:06.916755915 CET4977942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:07.041635036 CET4287649779147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:28:08.400230885 CET4287649779147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:28:08.400368929 CET4977942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:10.149432898 CET4977942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:10.150228024 CET4978942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:10.273554087 CET4287649779147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:28:10.274333954 CET4287649789147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:28:10.274403095 CET4978942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:10.290338039 CET4978942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:10.412559032 CET4287649789147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:28:10.412746906 CET4978942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:10.537792921 CET4287649789147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:28:12.041523933 CET4287649789147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:28:12.041620970 CET4978942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:13.676042080 CET4978942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:13.676882982 CET4979642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:13.797009945 CET4287649789147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:28:13.797540903 CET4287649796147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:28:13.797722101 CET4979642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:13.798520088 CET4979642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:13.919867039 CET4287649796147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:28:13.920118093 CET4979642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:14.039748907 CET4287649796147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:28:15.519877911 CET4287649796147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:28:15.519938946 CET4979642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:17.062634945 CET4979642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:17.079392910 CET4980642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:17.434856892 CET4287649796147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:28:17.434873104 CET4287649806147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:28:17.434974909 CET4980642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:17.435878992 CET4980642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:17.562117100 CET4287649806147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:28:17.562186003 CET4980642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:17.683542967 CET4287649806147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:28:19.152081966 CET4287649806147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:28:19.152141094 CET4980642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:20.596735954 CET4980642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:20.618604898 CET4981342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:20.716305017 CET4287649806147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:28:20.738532066 CET4287649813147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:28:20.741691113 CET4981342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:20.742541075 CET4981342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:20.866981983 CET4287649813147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:28:20.867055893 CET4981342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:20.988595009 CET4287649813147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:28:22.433686018 CET4287649813147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:28:22.434011936 CET4981342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:23.769623041 CET4981342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:23.774049044 CET4982342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:23.889483929 CET4287649813147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:28:23.893759012 CET4287649823147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:28:23.893826008 CET4982342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:23.895442009 CET4982342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:24.015412092 CET4287649823147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:28:24.015456915 CET4982342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:24.135181904 CET4287649823147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:28:25.600575924 CET4287649823147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:28:25.603632927 CET4982342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:26.887147903 CET4982342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:26.888266087 CET4983042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:27.013468027 CET4287649823147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:28:27.014270067 CET4287649830147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:28:27.014345884 CET4983042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:27.015105963 CET4983042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:27.134615898 CET4287649830147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:28:27.134685993 CET4983042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:27.255007029 CET4287649830147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:28:28.747380972 CET4287649830147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:28:28.747548103 CET4983042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:29.910415888 CET4983042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:29.911108017 CET4983642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:30.030244112 CET4287649830147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:28:30.030664921 CET4287649836147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:28:30.030838966 CET4983642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:30.031254053 CET4983642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:30.150857925 CET4287649836147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:28:30.150943995 CET4983642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:30.272675991 CET4287649836147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:28:55.747067928 CET4287649836147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:28:55.747256041 CET4983642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:56.832510948 CET4983642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:56.833472967 CET4989342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:56.958031893 CET4287649836147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:28:56.959407091 CET4287649893147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:28:56.959578991 CET4989342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:56.960211039 CET4989342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:57.080558062 CET4287649893147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:28:57.080717087 CET4989342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:57.201023102 CET4287649893147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:28:58.698340893 CET4287649893147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:28:58.698414087 CET4989342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:59.707443953 CET4989342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:59.708323956 CET4990242876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:59.827261925 CET4287649893147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:28:59.827950954 CET4287649902147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:28:59.828015089 CET4990242876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:59.828732014 CET4990242876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:28:59.948293924 CET4287649902147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:28:59.948383093 CET4990242876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:00.068877935 CET4287649902147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:01.513051987 CET4287649902147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:01.513130903 CET4990242876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:02.468944073 CET4990242876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:02.469686031 CET4990942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:02.595113039 CET4287649902147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:02.595918894 CET4287649909147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:02.596014023 CET4990942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:02.596570969 CET4990942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:02.716125965 CET4287649909147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:02.716202974 CET4990942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:02.835932970 CET4287649909147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:04.337802887 CET4287649909147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:04.337964058 CET4990942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:05.223046064 CET4990942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:05.223824024 CET4991542876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:05.350986004 CET4287649909147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:05.351361990 CET4287649915147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:05.351458073 CET4991542876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:05.380948067 CET4991542876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:05.501697063 CET4287649915147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:05.501862049 CET4991542876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:05.622298002 CET4287649915147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:07.058984995 CET4287649915147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:07.059057951 CET4991542876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:07.892216921 CET4991542876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:07.893045902 CET4992142876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:08.223014116 CET4991542876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:08.417521954 CET4287649915147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:08.417562008 CET4287649921147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:08.417593002 CET4287649915147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:08.417670012 CET4992142876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:08.417689085 CET4991542876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:08.464793921 CET4992142876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:08.589237928 CET4287649921147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:08.589437962 CET4992142876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:08.712429047 CET4287649921147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:10.123673916 CET4287649921147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:10.123780966 CET4992142876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:10.895049095 CET4992142876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:10.896028996 CET4992742876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:11.014683962 CET4287649921147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:11.015831947 CET4287649927147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:11.015908003 CET4992742876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:11.059281111 CET4992742876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:11.180203915 CET4287649927147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:11.180324078 CET4992742876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:11.300105095 CET4287649927147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:12.016439915 CET4992742876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:12.136668921 CET4287649927147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:12.716073990 CET4287649927147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:12.718626022 CET4992742876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:13.441854000 CET4992742876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:13.442615032 CET4993342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:13.561892986 CET4287649927147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:13.562675953 CET4287649933147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:13.562854052 CET4993342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:13.563422918 CET4993342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:13.683121920 CET4287649933147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:13.683348894 CET4993342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:13.803303003 CET4287649933147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:15.272238970 CET4287649933147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:15.272313118 CET4993342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:15.943768978 CET4993342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:15.944791079 CET4994042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:16.065109968 CET4287649933147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:16.066380024 CET4287649940147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:16.066462040 CET4994042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:16.067194939 CET4994042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:16.190677881 CET4287649940147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:16.190834045 CET4994042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:16.317065001 CET4287649940147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:17.797691107 CET4994042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:17.805912018 CET4287649940147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:17.805999041 CET4994042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:17.922288895 CET4287649940147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:17.931510925 CET4287649940147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:18.427267075 CET4994742876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:18.552556992 CET4287649947147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:18.552649021 CET4994742876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:18.553373098 CET4994742876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:18.672979116 CET4287649947147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:18.673079967 CET4994742876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:18.792897940 CET4287649947147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:19.739100933 CET4994742876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:19.860609055 CET4287649947147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:20.274725914 CET4287649947147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:20.274945974 CET4994742876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:20.876914978 CET4994742876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:20.880093098 CET4995442876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:21.001068115 CET4287649947147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:21.004547119 CET4287649954147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:21.004722118 CET4995442876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:21.005336046 CET4995442876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:21.126358032 CET4287649954147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:21.126523972 CET4995442876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:21.246221066 CET4287649954147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:21.315622091 CET4995442876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:21.436168909 CET4287649954147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:22.699886084 CET4287649954147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:22.700602055 CET4995442876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:23.267182112 CET4995442876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:23.274355888 CET4996042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:23.386976004 CET4287649954147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:23.393979073 CET4287649960147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:23.394071102 CET4996042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:23.394831896 CET4996042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:23.516133070 CET4287649960147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:23.516293049 CET4996042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:23.636177063 CET4287649960147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:23.636305094 CET4996042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:23.759087086 CET4287649960147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:25.090166092 CET4287649960147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:25.090245962 CET4996042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:25.682310104 CET4996042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:25.694852114 CET4996642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:25.808872938 CET4287649960147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:25.821559906 CET4287649966147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:25.821664095 CET4996642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:25.827889919 CET4996642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:25.952162027 CET4287649966147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:25.952275991 CET4996642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:26.071952105 CET4287649966147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:26.234384060 CET4996642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:26.354419947 CET4287649966147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:27.542459011 CET4287649966147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:27.542548895 CET4996642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:28.020212889 CET4996642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:28.021101952 CET4997242876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:28.520056009 CET4996642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:28.763843060 CET4287649966147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:28.763906002 CET4287649972147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:28.763997078 CET4997242876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:28.791785955 CET4287649966147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:28.791866064 CET4996642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:28.796449900 CET4997242876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:28.916255951 CET4287649972147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:28.916325092 CET4997242876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:29.036083937 CET4287649972147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:29.140402079 CET4997242876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:29.459511042 CET4287649972147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:30.451019049 CET4287649972147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:30.452065945 CET4997242876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:30.895386934 CET4997242876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:30.896178961 CET4997742876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:31.015192986 CET4287649972147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:31.015835047 CET4287649977147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:31.015995026 CET4997742876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:31.016652107 CET4997742876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:31.136883020 CET4287649977147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:31.137366056 CET4997742876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:31.258167028 CET4287649977147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:31.258357048 CET4997742876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:31.378119946 CET4287649977147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:32.745718956 CET4287649977147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:32.745784998 CET4997742876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:33.179620028 CET4997742876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:33.184573889 CET4998342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:33.301940918 CET4287649977147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:33.307308912 CET4287649983147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:33.307399988 CET4998342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:33.308342934 CET4998342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:33.428776979 CET4287649983147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:33.428957939 CET4998342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:33.548743010 CET4287649983147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:35.027128935 CET4287649983147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:35.028096914 CET4998342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:35.410903931 CET4998342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:35.411725044 CET4998942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:35.530481100 CET4287649983147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:35.531236887 CET4287649989147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:35.531425953 CET4998942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:35.532167912 CET4998942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:35.651735067 CET4287649989147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:35.652108908 CET4998942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:35.772947073 CET4287649989147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:37.218472004 CET4287649989147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:37.218554020 CET4998942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:37.590959072 CET4998942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:37.591845989 CET4999542876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:37.711275101 CET4287649989147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:37.712058067 CET4287649995147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:37.712148905 CET4999542876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:37.713030100 CET4999542876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:37.832626104 CET4287649995147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:37.832693100 CET4999542876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:37.952902079 CET4287649995147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:39.433336020 CET4287649995147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:39.433445930 CET4999542876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:39.770334959 CET4999542876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:39.771485090 CET5000142876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:39.890135050 CET4287649995147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:39.891076088 CET4287650001147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:39.891170025 CET5000142876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:39.891897917 CET5000142876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:40.011838913 CET4287650001147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:40.011989117 CET5000142876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:40.133254051 CET4287650001147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:41.619585991 CET4287650001147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:41.619693995 CET5000142876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:41.942121983 CET5000142876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:41.943260908 CET5000742876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:42.066063881 CET4287650001147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:42.067428112 CET4287650007147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:42.067501068 CET5000742876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:42.069273949 CET5000742876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:42.194211960 CET4287650007147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:42.194314957 CET5000742876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:42.317612886 CET4287650007147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:42.317708969 CET5000742876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:42.444137096 CET4287650007147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:43.793791056 CET4287650007147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:43.793919086 CET5000742876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:44.098442078 CET5000742876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:44.099306107 CET5001342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:44.224936008 CET4287650007147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:44.226025105 CET4287650013147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:44.226130009 CET5001342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:44.227018118 CET5001342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:44.353487015 CET4287650013147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:44.353620052 CET5001342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:44.476831913 CET4287650013147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:45.965678930 CET4287650013147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:45.965801954 CET5001342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:46.241379023 CET5001342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:46.242198944 CET5001942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:46.485534906 CET4287650013147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:46.485596895 CET4287650019147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:46.485688925 CET5001942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:46.487973928 CET5001942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:46.613872051 CET4287650019147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:46.613943100 CET5001942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:46.733654976 CET4287650019147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:48.185944080 CET4287650019147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:48.186033010 CET5001942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:48.494164944 CET5001942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:48.503763914 CET5002442876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:48.617722988 CET4287650019147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:48.628130913 CET4287650024147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:48.628325939 CET5002442876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:48.630909920 CET5002442876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:48.757333994 CET4287650024147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:48.757415056 CET5002442876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:48.879275084 CET4287650024147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:50.340990067 CET4287650024147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:50.341058016 CET5002442876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:50.582756996 CET5002442876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:50.583821058 CET5003042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:50.702500105 CET4287650024147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:50.703444004 CET4287650030147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:50.703543901 CET5003042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:50.710170031 CET5003042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:50.830476046 CET4287650030147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:50.830557108 CET5003042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:50.950478077 CET4287650030147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:52.391443014 CET4287650030147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:52.391518116 CET5003042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:52.640973091 CET5003042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:52.641839981 CET5003642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:52.760608912 CET4287650030147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:52.761396885 CET4287650036147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:52.761486053 CET5003642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:52.763222933 CET5003642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:52.883050919 CET4287650036147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:52.883119106 CET5003642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:53.003524065 CET4287650036147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:54.484859943 CET4287650036147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:54.484941006 CET5003642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:54.718832016 CET5003642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:54.737849951 CET5004042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:54.839456081 CET4287650036147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:54.857610941 CET4287650040147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:54.857691050 CET5004042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:54.859951973 CET5004042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:54.980597019 CET4287650040147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:54.980655909 CET5004042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:55.104891062 CET4287650040147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:56.608093023 CET4287650040147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:56.608190060 CET5004042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:56.811619043 CET5004042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:56.818912983 CET5004642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:56.935374022 CET4287650040147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:56.941720963 CET4287650046147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:56.941781998 CET5004642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:56.943978071 CET5004642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:57.067709923 CET4287650046147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:57.067761898 CET5004642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:57.188412905 CET4287650046147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:58.729470968 CET4287650046147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:58.729643106 CET5004642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:58.910953999 CET5004642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:58.911736965 CET5005142876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:59.033601999 CET4287650046147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:59.034288883 CET4287650051147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:59.034370899 CET5005142876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:59.035177946 CET5005142876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:59.154750109 CET4287650051147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:29:59.154856920 CET5005142876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:29:59.279674053 CET4287650051147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:00.716459036 CET4287650051147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:00.718502045 CET5005142876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:00.898472071 CET5005142876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:00.932959080 CET5005442876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:01.023576021 CET4287650051147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:01.059310913 CET4287650054147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:01.059405088 CET5005442876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:01.060620070 CET5005442876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:01.187036991 CET4287650054147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:01.187267065 CET5005442876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:01.363101006 CET4287650054147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:02.809235096 CET4287650054147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:02.809349060 CET5005442876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:03.001694918 CET5005442876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:03.015758038 CET5005542876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:03.121696949 CET4287650054147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:03.135570049 CET4287650055147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:03.135762930 CET5005542876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:03.136416912 CET5005542876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:03.258434057 CET4287650055147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:03.258511066 CET5005542876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:03.385031939 CET4287650055147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:04.862852097 CET4287650055147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:04.862931967 CET5005542876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:05.020344973 CET5005542876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:05.021505117 CET5005642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:05.141838074 CET4287650055147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:05.141916037 CET4287650056147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:05.142013073 CET5005642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:05.144404888 CET5005642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:05.264575005 CET4287650056147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:05.264653921 CET5005642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:05.384699106 CET4287650056147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:05.384843111 CET5005642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:05.506243944 CET4287650056147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:06.841013908 CET4287650056147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:06.841113091 CET5005642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:06.989696980 CET5005642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:06.990580082 CET5005742876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:07.110707045 CET4287650056147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:07.113493919 CET4287650057147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:07.113579988 CET5005742876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:07.114444017 CET5005742876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:07.235760927 CET4287650057147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:07.235896111 CET5005742876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:07.362510920 CET4287650057147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:08.838121891 CET4287650057147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:08.838192940 CET5005742876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:08.985681057 CET5005742876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:09.020529032 CET5005842876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:09.110634089 CET4287650057147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:09.145365953 CET4287650058147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:09.145488024 CET5005842876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:09.158427954 CET5005842876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:09.280951023 CET4287650058147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:09.281075954 CET5005842876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:09.400746107 CET4287650058147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:10.869486094 CET4287650058147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:10.869674921 CET5005842876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:10.992216110 CET5005842876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:10.993175983 CET5005942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:11.114731073 CET4287650058147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:11.115423918 CET4287650059147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:11.115600109 CET5005942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:11.116363049 CET5005942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:11.236062050 CET4287650059147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:11.236133099 CET5005942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:11.360347986 CET4287650059147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:12.810055971 CET4287650059147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:12.810231924 CET5005942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:12.926644087 CET5005942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:12.927694082 CET5006042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:13.046268940 CET4287650059147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:13.047355890 CET4287650060147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:13.047418118 CET5006042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:13.048197031 CET5006042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:13.167695999 CET4287650060147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:13.167753935 CET5006042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:13.287379026 CET4287650060147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:14.777482033 CET4287650060147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:14.777616024 CET5006042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:14.895977020 CET5006042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:14.897079945 CET5006142876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:15.021176100 CET4287650060147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:15.022219896 CET4287650061147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:15.022294998 CET5006142876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:15.023097038 CET5006142876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:15.144057035 CET4287650061147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:15.144117117 CET5006142876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:15.263767004 CET4287650061147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:15.803404093 CET5006142876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:15.923127890 CET4287650061147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:16.760669947 CET4287650061147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:16.760766029 CET5006142876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:16.865807056 CET5006142876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:16.893740892 CET5006242876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:16.987735033 CET4287650061147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:17.016210079 CET4287650062147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:17.016279936 CET5006242876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:17.017306089 CET5006242876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:17.136929989 CET4287650062147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:17.136992931 CET5006242876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:17.257704973 CET4287650062147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:18.747339964 CET4287650062147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:18.747395039 CET5006242876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:18.848587036 CET5006242876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:18.849488020 CET5006342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:18.968439102 CET4287650062147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:18.969208002 CET4287650063147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:18.969286919 CET5006342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:18.970099926 CET5006342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:19.089754105 CET4287650063147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:19.089876890 CET5006342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:19.209542990 CET4287650063147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:20.698482990 CET4287650063147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:20.698606014 CET5006342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:20.791939974 CET5006342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:20.792809010 CET5006442876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:21.063690901 CET4287650063147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:21.063735962 CET4287650064147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:21.063805103 CET5006442876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:21.064635038 CET5006442876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:21.185151100 CET4287650064147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:21.185276031 CET5006442876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:21.307066917 CET4287650064147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:22.795747995 CET4287650064147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:22.795850039 CET5006442876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:22.879815102 CET5006442876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:22.880682945 CET5006542876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:22.999541998 CET4287650064147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:23.000361919 CET4287650065147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:23.000449896 CET5006542876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:23.067903042 CET5006542876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:23.189982891 CET4287650065147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:23.190052986 CET5006542876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:23.309849977 CET4287650065147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:24.685468912 CET4287650065147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:24.685549021 CET5006542876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:24.780563116 CET5006542876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:24.789299011 CET5006642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:24.900321007 CET4287650065147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:24.909077883 CET4287650066147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:24.909156084 CET5006642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:24.909725904 CET5006642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:25.029618025 CET4287650066147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:25.029670954 CET5006642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:25.155107975 CET4287650066147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:26.607614994 CET4287650066147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:26.607677937 CET5006642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:26.676701069 CET5006642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:26.677501917 CET5006742876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:26.799448967 CET4287650066147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:26.799689054 CET4287650067147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:26.799762964 CET5006742876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:26.800683022 CET5006742876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:26.920840025 CET4287650067147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:26.920949936 CET5006742876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:27.041131020 CET4287650067147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:28.484046936 CET4287650067147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:28.484222889 CET5006742876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:28.561431885 CET5006742876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:28.576141119 CET5006842876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:28.681051016 CET4287650067147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:28.696090937 CET4287650068147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:28.696192980 CET5006842876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:28.697052002 CET5006842876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:28.816670895 CET4287650068147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:28.816797018 CET5006842876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:28.936525106 CET4287650068147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:30.389622927 CET4287650068147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:30.389695883 CET5006842876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:30.471415997 CET5006842876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:30.494298935 CET5006942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:30.598067999 CET4287650068147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:30.620721102 CET4287650069147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:30.620810032 CET5006942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:30.621315002 CET5006942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:30.744395018 CET4287650069147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:30.744597912 CET5006942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:30.864299059 CET4287650069147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:32.312088966 CET4287650069147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:32.312180996 CET5006942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:32.383297920 CET5006942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:32.384032011 CET5007042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:32.504101992 CET4287650069147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:32.504766941 CET4287650070147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:32.504851103 CET5007042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:32.505467892 CET5007042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:32.631942987 CET4287650070147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:32.632066011 CET5007042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:32.756716967 CET4287650070147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:34.204214096 CET4287650070147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:34.204293966 CET5007042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:34.270486116 CET5007042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:34.271218061 CET5007142876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:34.394553900 CET4287650070147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:34.395349979 CET4287650071147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:34.395488977 CET5007142876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:34.395945072 CET5007142876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:34.517010927 CET4287650071147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:34.517062902 CET5007142876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:34.636671066 CET4287650071147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:36.105887890 CET4287650071147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:36.105956078 CET5007142876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:36.161546946 CET5007142876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:36.163137913 CET5007242876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:36.281872034 CET4287650071147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:36.283756018 CET4287650072147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:36.283854961 CET5007242876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:36.284419060 CET5007242876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:36.405853987 CET4287650072147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:36.406094074 CET5007242876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:36.526195049 CET4287650072147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:38.008826971 CET4287650072147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:38.010580063 CET5007242876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:38.067415953 CET5007242876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:38.068351984 CET5007342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:38.187817097 CET4287650072147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:38.188688040 CET4287650073147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:38.188802004 CET5007342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:38.189589977 CET5007342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:38.309433937 CET4287650073147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:38.310488939 CET5007342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:38.433751106 CET4287650073147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:39.915257931 CET4287650073147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:39.915350914 CET5007342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:39.960961103 CET5007342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:39.961606026 CET5007442876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:40.086393118 CET4287650073147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:40.087043047 CET4287650074147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:40.087131977 CET5007442876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:40.087676048 CET5007442876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:40.207202911 CET4287650074147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:40.207293987 CET5007442876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:40.328469992 CET4287650074147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:41.825644970 CET4287650074147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:41.825740099 CET5007442876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:41.880774975 CET5007442876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:41.887458086 CET5007542876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:42.000417948 CET4287650074147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:42.007306099 CET4287650075147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:42.007406950 CET5007542876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:42.007971048 CET5007542876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:42.129209995 CET4287650075147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:42.129298925 CET5007542876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:42.249191046 CET4287650075147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:43.701751947 CET4287650075147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:43.701885939 CET5007542876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:43.740753889 CET5007542876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:43.767869949 CET5007642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:43.860388994 CET4287650075147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:43.887625933 CET4287650076147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:43.887712955 CET5007642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:43.888278008 CET5007642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:44.008791924 CET4287650076147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:44.008872032 CET5007642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:44.131422997 CET4287650076147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:45.624238014 CET4287650076147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:45.624315977 CET5007642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:45.661259890 CET5007642876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:45.662307978 CET5007742876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:45.780967951 CET4287650076147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:45.782135010 CET4287650077147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:45.782239914 CET5007742876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:45.782984018 CET5007742876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:45.902703047 CET4287650077147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:45.902822018 CET5007742876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:46.022564888 CET4287650077147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:47.483817101 CET4287650077147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:47.483891010 CET5007742876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:47.524580002 CET5007742876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:47.527626991 CET5007842876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:47.644474030 CET4287650077147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:47.647231102 CET4287650078147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:47.647315979 CET5007842876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:47.647823095 CET5007842876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:47.769232988 CET4287650078147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:47.769320011 CET5007842876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:47.889705896 CET4287650078147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:48.135698080 CET5007842876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:48.256395102 CET4287650078147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:49.391014099 CET4287650078147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:49.391093016 CET5007842876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:49.427361012 CET5007842876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:49.428025007 CET5007942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:49.547271013 CET4287650078147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:49.547929049 CET4287650079147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:49.548017979 CET5007942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:49.548518896 CET5007942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:49.668415070 CET4287650079147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:49.668487072 CET5007942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:49.789911032 CET4287650079147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:51.248910904 CET4287650079147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:51.249010086 CET5007942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:51.286247015 CET5007942876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:51.287008047 CET5008042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:51.406869888 CET4287650079147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:51.407605886 CET4287650080147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:51.407692909 CET5008042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:51.409873009 CET5008042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:51.529508114 CET4287650080147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:51.529567957 CET5008042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:51.652434111 CET4287650080147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:53.169272900 CET4287650080147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:53.169394970 CET5008042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:53.213754892 CET5008042876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:53.214447975 CET5008142876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:53.338026047 CET4287650080147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:53.338664055 CET4287650081147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:53.338768959 CET5008142876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:53.339639902 CET5008142876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:53.459193945 CET4287650081147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:53.459286928 CET5008142876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:53.579046965 CET4287650081147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:55.062304020 CET4287650081147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:55.062550068 CET5008142876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:55.108967066 CET5008142876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:55.112567902 CET5008242876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:55.228645086 CET4287650081147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:55.232264996 CET4287650082147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:55.232332945 CET5008242876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:55.232783079 CET5008242876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:55.352405071 CET4287650082147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:55.352658987 CET5008242876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:55.472270966 CET4287650082147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:56.291850090 CET5008242876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:56.416831970 CET4287650082147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:56.937350035 CET4287650082147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:56.937442064 CET5008242876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:56.989393950 CET5008242876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:56.990153074 CET5008342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:57.110193968 CET4287650082147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:57.110802889 CET4287650083147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:57.110865116 CET5008342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:57.111373901 CET5008342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:57.231723070 CET4287650083147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:57.231816053 CET5008342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:57.351473093 CET4287650083147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:58.826746941 CET4287650083147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:58.827635050 CET5008342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:58.867729902 CET5008342876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:58.868509054 CET5008442876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:58.987364054 CET4287650083147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:58.988040924 CET4287650084147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:58.988122940 CET5008442876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:58.988653898 CET5008442876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:59.108314991 CET4287650084147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:30:59.108366966 CET5008442876192.168.2.4147.185.221.18
                                  Dec 25, 2024 19:30:59.228343010 CET4287650084147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:31:00.670743942 CET4287650084147.185.221.18192.168.2.4
                                  Dec 25, 2024 19:31:00.671606064 CET5008442876192.168.2.4147.185.221.18
                                  TimestampSource PortDest PortSource IPDest IP
                                  Dec 25, 2024 19:27:00.367744923 CET6456753192.168.2.41.1.1.1
                                  Dec 25, 2024 19:27:00.636287928 CET53645671.1.1.1192.168.2.4
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Dec 25, 2024 19:27:00.367744923 CET192.168.2.41.1.1.10x70faStandard query (0)company-telecom.gl.at.ply.ggA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Dec 25, 2024 19:27:00.636287928 CET1.1.1.1192.168.2.40x70faNo error (0)company-telecom.gl.at.ply.gg147.185.221.18A (IP address)IN (0x0001)false

                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Click to jump to process

                                  Target ID:0
                                  Start time:13:26:53
                                  Start date:25/12/2024
                                  Path:C:\Users\user\Desktop\gReXLT7XjR.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\Desktop\gReXLT7XjR.exe"
                                  Imagebase:0x510000
                                  File size:95'232 bytes
                                  MD5 hash:4951D592FAC59EF8005596D2AF5D116B
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000000.00000002.1679600607.0000000003B08000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: 00000000.00000002.1679600607.0000000003B08000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                  • Rule: Njrat, Description: detect njRAT in memory, Source: 00000000.00000002.1679600607.0000000003B08000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                  • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000000.00000000.1661776984.0000000000512000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: 00000000.00000000.1661776984.0000000000512000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                                  • Rule: Njrat, Description: detect njRAT in memory, Source: 00000000.00000000.1661776984.0000000000512000.00000002.00000001.01000000.00000003.sdmp, Author: JPCERT/CC Incident Response Group
                                  Reputation:low
                                  Has exited:true

                                  Target ID:1
                                  Start time:13:26:54
                                  Start date:25/12/2024
                                  Path:C:\Windows\server.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Windows\server.exe"
                                  Imagebase:0xec0000
                                  File size:95'232 bytes
                                  MD5 hash:4951D592FAC59EF8005596D2AF5D116B
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000001.00000002.4112787916.00000000034F1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Windows\server.exe, Author: Joe Security
                                  • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\Windows\server.exe, Author: unknown
                                  • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: C:\Windows\server.exe, Author: Florian Roth
                                  • Rule: crimeware_njrat_strings, Description: Detects njRAT based on some strings, Source: C:\Windows\server.exe, Author: Sekoia.io
                                  • Rule: Njrat, Description: detect njRAT in memory, Source: C:\Windows\server.exe, Author: JPCERT/CC Incident Response Group
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Windows\server.exe, Author: ditekSHen
                                  Antivirus matches:
                                  • Detection: 100%, Avira
                                  • Detection: 100%, Joe Sandbox ML
                                  • Detection: 87%, ReversingLabs
                                  Reputation:low
                                  Has exited:false

                                  Target ID:2
                                  Start time:13:26:56
                                  Start date:25/12/2024
                                  Path:C:\Windows\SysWOW64\netsh.exe
                                  Wow64 process (32bit):true
                                  Commandline:netsh firewall add allowedprogram "C:\Windows\server.exe" "server.exe" ENABLE
                                  Imagebase:0x1560000
                                  File size:82'432 bytes
                                  MD5 hash:4E89A1A088BE715D6C946E55AB07C7DF
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:3
                                  Start time:13:26:56
                                  Start date:25/12/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff7699e0000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:4
                                  Start time:13:26:56
                                  Start date:25/12/2024
                                  Path:C:\Windows\SysWOW64\netsh.exe
                                  Wow64 process (32bit):true
                                  Commandline:netsh firewall delete allowedprogram "C:\Windows\server.exe"
                                  Imagebase:0x1560000
                                  File size:82'432 bytes
                                  MD5 hash:4E89A1A088BE715D6C946E55AB07C7DF
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:5
                                  Start time:13:26:56
                                  Start date:25/12/2024
                                  Path:C:\Windows\SysWOW64\netsh.exe
                                  Wow64 process (32bit):true
                                  Commandline:netsh firewall add allowedprogram "C:\Windows\server.exe" "server.exe" ENABLE
                                  Imagebase:0x1560000
                                  File size:82'432 bytes
                                  MD5 hash:4E89A1A088BE715D6C946E55AB07C7DF
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:6
                                  Start time:13:26:56
                                  Start date:25/12/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff7699e0000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:7
                                  Start time:13:26:56
                                  Start date:25/12/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff7699e0000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:8
                                  Start time:13:27:07
                                  Start date:25/12/2024
                                  Path:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exe"
                                  Imagebase:0x4c0000
                                  File size:95'232 bytes
                                  MD5 hash:4951D592FAC59EF8005596D2AF5D116B
                                  Has elevated privileges:false
                                  Has administrator privileges:false
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exe, Author: Joe Security
                                  • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exe, Author: unknown
                                  • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exe, Author: Florian Roth
                                  • Rule: crimeware_njrat_strings, Description: Detects njRAT based on some strings, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exe, Author: Sekoia.io
                                  • Rule: Njrat, Description: detect njRAT in memory, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exe, Author: JPCERT/CC Incident Response Group
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exe, Author: ditekSHen
                                  Antivirus matches:
                                  • Detection: 100%, Avira
                                  • Detection: 100%, Joe Sandbox ML
                                  • Detection: 87%, ReversingLabs
                                  Reputation:low
                                  Has exited:true

                                  Target ID:11
                                  Start time:13:27:09
                                  Start date:25/12/2024
                                  Path:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\445c7762b8f06a76352fcac2e22df159Windows Update.exe"
                                  Imagebase:0xc90000
                                  File size:95'232 bytes
                                  MD5 hash:4951D592FAC59EF8005596D2AF5D116B
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:low
                                  Has exited:true

                                  Target ID:13
                                  Start time:13:27:16
                                  Start date:25/12/2024
                                  Path:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeadMom.exe"
                                  Imagebase:0xbd0000
                                  File size:95'232 bytes
                                  MD5 hash:4951D592FAC59EF8005596D2AF5D116B
                                  Has elevated privileges:false
                                  Has administrator privileges:false
                                  Programmed in:C, C++ or other language
                                  Antivirus matches:
                                  • Detection: 87%, ReversingLabs
                                  Reputation:low
                                  Has exited:true

                                  Target ID:16
                                  Start time:13:27:26
                                  Start date:25/12/2024
                                  Path:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe"
                                  Imagebase:0x3b0000
                                  File size:95'232 bytes
                                  MD5 hash:4951D592FAC59EF8005596D2AF5D116B
                                  Has elevated privileges:false
                                  Has administrator privileges:false
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, Author: Joe Security
                                  • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, Author: unknown
                                  • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, Author: Florian Roth
                                  • Rule: crimeware_njrat_strings, Description: Detects njRAT based on some strings, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, Author: Sekoia.io
                                  • Rule: crimeware_njrat_strings, Description: Detects njRAT based on some strings, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, Author: Sekoia.io
                                  • Rule: Njrat, Description: detect njRAT in memory, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, Author: JPCERT/CC Incident Response Group
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, Author: ditekSHen
                                  Antivirus matches:
                                  • Detection: 100%, Avira
                                  • Detection: 100%, Joe Sandbox ML
                                  • Detection: 87%, ReversingLabs
                                  Reputation:low
                                  Has exited:true

                                  Reset < >

                                    Execution Graph

                                    Execution Coverage:2.4%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:0%
                                    Total number of Nodes:58
                                    Total number of Limit Nodes:4
                                    execution_graph 14192 dfa9bf 14193 dfa9c9 SetErrorMode 14192->14193 14195 dfaa53 14193->14195 14149 dfabbe 14150 dfabea CloseHandle 14149->14150 14151 dfac29 14149->14151 14152 dfabf8 14150->14152 14151->14150 14153 dfa65e 14154 dfa68a OleInitialize 14153->14154 14155 dfa6c0 14153->14155 14156 dfa698 14154->14156 14155->14154 14212 dfa61e 14213 dfa65e OleInitialize 14212->14213 14215 dfa698 14213->14215 14196 dfab7c 14197 dfabbe CloseHandle 14196->14197 14199 dfabf8 14197->14199 14157 dfa59a 14158 dfa5d8 DuplicateHandle 14157->14158 14159 dfa610 14157->14159 14160 dfa5e6 14158->14160 14159->14158 14200 dfae77 14201 dfaeae WriteFile 14200->14201 14203 dfaf15 14201->14203 14216 dfac37 14217 dfac6a GetFileType 14216->14217 14219 dfaccc 14217->14219 14220 dfb036 14222 dfb06a CreateMutexW 14220->14222 14223 dfb0e5 14222->14223 14204 dfaa75 14206 dfaaa6 CreateFileW 14204->14206 14207 dfab2d 14206->14207 14208 dfa573 14209 dfa59a DuplicateHandle 14208->14209 14211 dfa5e6 14209->14211 14161 dfaa12 14162 dfaa3e SetErrorMode 14161->14162 14163 dfaa67 14161->14163 14164 dfaa53 14162->14164 14163->14162 14165 dfaeae 14167 dfaee3 WriteFile 14165->14167 14168 dfaf15 14167->14168 14188 dfa6ce 14189 dfa72e OleGetClipboard 14188->14189 14191 dfa78c 14189->14191 14172 dfb06a 14174 dfb0a2 CreateMutexW 14172->14174 14175 dfb0e5 14174->14175 14180 dfaaa6 14181 dfaade CreateFileW 14180->14181 14183 dfab2d 14181->14183 14184 dfb446 14186 dfb46c ShellExecuteExW 14184->14186 14187 dfb488 14186->14187 14224 dfb424 14226 dfb446 ShellExecuteExW 14224->14226 14227 dfb488 14226->14227

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 0 4ce4298-4ce42c9 2 4ce42cf-4ce4350 0->2 3 4ce4352-4ce435a 0->3 2->3 29 4ce435c 2->29 4 4ce4366-4ce437a 3->4 5 4ce452f-4ce467d 4->5 6 4ce4380-4ce43bc 4->6 44 4ce480d-4ce4821 5->44 45 4ce4683-4ce47d2 5->45 18 4ce43be-4ce43e6 6->18 19 4ce43ed-4ce44ea 6->19 18->19 140 4ce44ef 19->140 29->4 46 4ce496f-4ce4983 44->46 47 4ce4827-4ce4934 44->47 45->44 48 4ce49d6-4ce49ea 46->48 49 4ce4985-4ce499b call 4ce4210 46->49 47->46 54 4ce49ec-4ce49f7 48->54 55 4ce4a32-4ce4a46 48->55 49->48 54->55 58 4ce4a4c-4ce4b59 55->58 59 4ce4b94-4ce4ba8 55->59 58->59 62 4ce4bae-4ce4bc2 59->62 63 4ce4cd4-4ce4ce8 59->63 68 4ce4bc4-4ce4bcb 62->68 69 4ce4bd0-4ce4be4 62->69 65 4ce4cee-4ce4f2d 63->65 66 4ce4f74-4ce4f88 63->66 65->66 73 4ce4f8a-4ce4f9b 66->73 74 4ce4fe2-4ce4ff6 66->74 78 4ce4c48-4ce4c5c 68->78 75 4ce4bef-4ce4c03 69->75 76 4ce4be6-4ce4bed 69->76 73->74 81 4ce4ff8-4ce4ffe 74->81 82 4ce5045-4ce5059 74->82 83 4ce4c0e-4ce4c22 75->83 84 4ce4c05-4ce4c0c 75->84 76->78 85 4ce4c5e-4ce4c74 78->85 86 4ce4c76-4ce4c82 78->86 81->82 90 4ce505b 82->90 91 4ce50a2-4ce50b6 82->91 92 4ce4c2d-4ce4c41 83->92 93 4ce4c24-4ce4c2b 83->93 84->78 95 4ce4c8d 85->95 86->95 90->91 99 4ce512d-4ce5141 91->99 100 4ce50b8-4ce50e1 91->100 92->78 101 4ce4c43-4ce4c45 92->101 93->78 95->63 106 4ce5147-4ce5363 99->106 107 4ce53b4-4ce53c8 99->107 100->99 101->78 489 4ce5367 106->489 490 4ce5365 106->490 114 4ce549e-4ce54b2 107->114 115 4ce53ce-4ce5457 107->115 119 4ce566f-4ce5683 114->119 120 4ce54b8-4ce5628 114->120 115->114 125 4ce5689-4ce579f 119->125 126 4ce57e6-4ce57fa 119->126 120->119 125->126 129 4ce595d-4ce5971 126->129 130 4ce5800-4ce5916 126->130 137 4ce5977-4ce5a8d 129->137 138 4ce5ad4-4ce5ae8 129->138 130->129 137->138 143 4ce5aee-4ce5c04 138->143 144 4ce5c4b-4ce5c5f 138->144 140->5 143->144 151 4ce5c65-4ce5d7b 144->151 152 4ce5dc2-4ce5dd6 144->152 151->152 157 4ce5ddc-4ce5ef2 152->157 158 4ce5f39-4ce5f4d 152->158 157->158 164 4ce5f53-4ce6069 158->164 165 4ce60b0-4ce60c4 158->165 164->165 172 4ce60ca-4ce61e0 165->172 173 4ce6227-4ce623b 165->173 172->173 187 4ce639e-4ce63b2 173->187 188 4ce6241-4ce6357 173->188 197 4ce63b8-4ce63fd call 4ce4278 187->197 198 4ce6536-4ce654a 187->198 188->187 322 4ce64bd-4ce64df 197->322 204 4ce668d-4ce66a1 198->204 205 4ce6550-4ce656f 198->205 216 4ce67ee-4ce6802 204->216 217 4ce66a7-4ce67a7 204->217 236 4ce6614-4ce6636 205->236 224 4ce694f-4ce6963 216->224 225 4ce6808-4ce6908 216->225 217->216 240 4ce6969-4ce6a69 224->240 241 4ce6ab0-4ce6ada 224->241 225->224 249 4ce663c 236->249 250 4ce6574-4ce6583 236->250 240->241 264 4ce6b9a-4ce6bae 241->264 265 4ce6ae0-4ce6b53 241->265 249->204 261 4ce663e 250->261 262 4ce6589-4ce65bc 250->262 282 4ce6643-4ce668b 261->282 355 4ce65be-4ce65f8 262->355 356 4ce6603-4ce660c 262->356 277 4ce6c8b-4ce6c9f 264->277 278 4ce6bb4-4ce6c44 264->278 265->264 285 4ce6de5-4ce6df9 277->285 286 4ce6ca5-4ce6d9e 277->286 278->277 282->204 298 4ce6dff-4ce6e4f 285->298 299 4ce705c-4ce7070 285->299 286->285 417 4ce6ebd-4ce6ee8 298->417 418 4ce6e51-4ce6e77 298->418 309 4ce7158-4ce715f 299->309 310 4ce7076-4ce7111 call 4ce4278 * 2 299->310 310->309 334 4ce64e5 322->334 335 4ce6402-4ce6411 322->335 334->198 352 4ce64e7 335->352 353 4ce6417-4ce64b5 335->353 379 4ce64ec-4ce6534 352->379 353->379 491 4ce64b7 353->491 355->356 356->282 360 4ce660e 356->360 360->236 379->198 487 4ce6eee-4ce6fc1 417->487 488 4ce6fc6-4ce7057 417->488 493 4ce6eb8 418->493 494 4ce6e79-4ce6e99 418->494 487->299 488->299 497 4ce536d 489->497 490->497 491->322 493->299 494->493 497->107
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1679725755.0000000004CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4ce0000_gReXLT7XjR.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: @$\Ok$|t$2k
                                    • API String ID: 0-3656409254
                                    • Opcode ID: 65d5e8ccf12653f250414935c3c27269f37ff51c654f8fd27217c457bfe63e62
                                    • Instruction ID: e86238d241b5b44c8b1e18b9f8bbc87f26b05729757e49f6c7290a2fb34188a5
                                    • Opcode Fuzzy Hash: 65d5e8ccf12653f250414935c3c27269f37ff51c654f8fd27217c457bfe63e62
                                    • Instruction Fuzzy Hash: E9233B74A01228CFDB28EF35D994BADB7B2BB48308F1041E9D949677A4DB359E84CF50

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 555 4ce4287-4ce42c9 558 4ce42cf-4ce4350 555->558 559 4ce4352-4ce435a 555->559 558->559 585 4ce435c 558->585 560 4ce4366-4ce437a 559->560 561 4ce452f-4ce467d 560->561 562 4ce4380-4ce43bc 560->562 600 4ce480d-4ce4821 561->600 601 4ce4683-4ce47d2 561->601 574 4ce43be-4ce43e6 562->574 575 4ce43ed-4ce44ea 562->575 574->575 696 4ce44ef 575->696 585->560 602 4ce496f-4ce4983 600->602 603 4ce4827-4ce4934 600->603 601->600 604 4ce49d6-4ce49ea 602->604 605 4ce4985-4ce499b call 4ce4210 602->605 603->602 610 4ce49ec-4ce49f7 604->610 611 4ce4a32-4ce4a46 604->611 605->604 610->611 614 4ce4a4c-4ce4b59 611->614 615 4ce4b94-4ce4ba8 611->615 614->615 618 4ce4bae-4ce4bc2 615->618 619 4ce4cd4-4ce4ce8 615->619 624 4ce4bc4-4ce4bcb 618->624 625 4ce4bd0-4ce4be4 618->625 621 4ce4cee-4ce4f2d 619->621 622 4ce4f74-4ce4f88 619->622 621->622 629 4ce4f8a-4ce4f9b 622->629 630 4ce4fe2-4ce4ff6 622->630 634 4ce4c48-4ce4c5c 624->634 631 4ce4bef-4ce4c03 625->631 632 4ce4be6-4ce4bed 625->632 629->630 637 4ce4ff8-4ce4ffe 630->637 638 4ce5045-4ce5059 630->638 639 4ce4c0e-4ce4c22 631->639 640 4ce4c05-4ce4c0c 631->640 632->634 641 4ce4c5e-4ce4c74 634->641 642 4ce4c76-4ce4c82 634->642 637->638 646 4ce505b 638->646 647 4ce50a2-4ce50b6 638->647 648 4ce4c2d-4ce4c41 639->648 649 4ce4c24-4ce4c2b 639->649 640->634 651 4ce4c8d 641->651 642->651 646->647 655 4ce512d-4ce5141 647->655 656 4ce50b8-4ce50e1 647->656 648->634 657 4ce4c43-4ce4c45 648->657 649->634 651->619 662 4ce5147-4ce5363 655->662 663 4ce53b4-4ce53c8 655->663 656->655 657->634 1045 4ce5367 662->1045 1046 4ce5365 662->1046 670 4ce549e-4ce54b2 663->670 671 4ce53ce-4ce5457 663->671 675 4ce566f-4ce5683 670->675 676 4ce54b8-4ce5628 670->676 671->670 681 4ce5689-4ce579f 675->681 682 4ce57e6-4ce57fa 675->682 676->675 681->682 685 4ce595d-4ce5971 682->685 686 4ce5800-4ce5916 682->686 693 4ce5977-4ce5a8d 685->693 694 4ce5ad4-4ce5ae8 685->694 686->685 693->694 699 4ce5aee-4ce5c04 694->699 700 4ce5c4b-4ce5c5f 694->700 696->561 699->700 707 4ce5c65-4ce5d7b 700->707 708 4ce5dc2-4ce5dd6 700->708 707->708 713 4ce5ddc-4ce5ef2 708->713 714 4ce5f39-4ce5f4d 708->714 713->714 720 4ce5f53-4ce6069 714->720 721 4ce60b0-4ce60c4 714->721 720->721 728 4ce60ca-4ce61e0 721->728 729 4ce6227-4ce623b 721->729 728->729 743 4ce639e-4ce63b2 729->743 744 4ce6241-4ce6357 729->744 753 4ce63b8-4ce63fd call 4ce4278 743->753 754 4ce6536-4ce654a 743->754 744->743 878 4ce64bd-4ce64df 753->878 760 4ce668d-4ce66a1 754->760 761 4ce6550-4ce656f 754->761 772 4ce67ee-4ce6802 760->772 773 4ce66a7-4ce67a7 760->773 792 4ce6614-4ce6636 761->792 780 4ce694f-4ce6963 772->780 781 4ce6808-4ce6908 772->781 773->772 796 4ce6969-4ce6a69 780->796 797 4ce6ab0-4ce6ada 780->797 781->780 805 4ce663c 792->805 806 4ce6574-4ce6583 792->806 796->797 820 4ce6b9a-4ce6bae 797->820 821 4ce6ae0-4ce6b53 797->821 805->760 817 4ce663e 806->817 818 4ce6589-4ce65bc 806->818 838 4ce6643-4ce668b 817->838 911 4ce65be-4ce65f8 818->911 912 4ce6603-4ce660c 818->912 833 4ce6c8b-4ce6c9f 820->833 834 4ce6bb4-4ce6c44 820->834 821->820 841 4ce6de5-4ce6df9 833->841 842 4ce6ca5-4ce6d9e 833->842 834->833 838->760 854 4ce6dff-4ce6e4f 841->854 855 4ce705c-4ce7070 841->855 842->841 973 4ce6ebd-4ce6ee8 854->973 974 4ce6e51-4ce6e77 854->974 865 4ce7158-4ce715f 855->865 866 4ce7076-4ce7111 call 4ce4278 * 2 855->866 866->865 890 4ce64e5 878->890 891 4ce6402-4ce6411 878->891 890->754 908 4ce64e7 891->908 909 4ce6417-4ce64b5 891->909 935 4ce64ec-4ce6534 908->935 909->935 1047 4ce64b7 909->1047 911->912 912->838 916 4ce660e 912->916 916->792 935->754 1043 4ce6eee-4ce6fc1 973->1043 1044 4ce6fc6-4ce7057 973->1044 1049 4ce6eb8 974->1049 1050 4ce6e79-4ce6e99 974->1050 1043->855 1044->855 1053 4ce536d 1045->1053 1046->1053 1047->878 1049->855 1050->1049 1053->663
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1679725755.0000000004CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4ce0000_gReXLT7XjR.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $\Ok$|t$2k
                                    • API String ID: 0-3739186446
                                    • Opcode ID: 1b4140cfe20f2ff1242769ffe0f0743546408698b11ffafbd2b517ddbce1a6a0
                                    • Instruction ID: 3416bd33baa4a9e1280cc909b641c9d2ba84dad14a7dcac647ca0bb82b7bbf1a
                                    • Opcode Fuzzy Hash: 1b4140cfe20f2ff1242769ffe0f0743546408698b11ffafbd2b517ddbce1a6a0
                                    • Instruction Fuzzy Hash: C5133B74A01228CFDB28EF35DA94BA9B7B2FB48308F1041E9D949677A4DB355E84CF50

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1111 4ce3441-4ce3462 call e10606 1114 4ce3468-4ce34e8 1111->1114
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1679725755.0000000004CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4ce0000_gReXLT7XjR.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: HQ$XR$`O$P
                                    • API String ID: 0-917331388
                                    • Opcode ID: 1c573115af068f70e430188315939a3ef2afd024abcc0630b2213017a693da61
                                    • Instruction ID: 8c25df31f7a8e2a14f408119241986e299559b03037e22f31258be9bd9b17eb7
                                    • Opcode Fuzzy Hash: 1c573115af068f70e430188315939a3ef2afd024abcc0630b2213017a693da61
                                    • Instruction Fuzzy Hash: 3201D2B4606246EFC714FB38D60946D77E1EFC430DB10982CE24587B99EF3888888B93

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1126 4ce3802-4ce3911 1144 4ce3917-4ce3919 1126->1144 1145 4ce3913 1126->1145 1146 4ce3920-4ce3927 1144->1146 1147 4ce391b 1145->1147 1148 4ce3915 1145->1148 1149 4ce39bd-4ce3adf 1146->1149 1150 4ce392d-4ce39b2 1146->1150 1147->1146 1148->1144 1174 4ce3b5b-4ce3bae 1149->1174 1175 4ce3ae1-4ce3b51 1149->1175 1150->1149 1183 4ce3bb5 1174->1183 1184 4ce3bb0 1174->1184 1175->1174 1263 4ce3bb5 call 4ce4298 1183->1263 1264 4ce3bb5 call e10606 1183->1264 1265 4ce3bb5 call 4ce4287 1183->1265 1184->1183 1185 4ce3bbb-4ce3bcf 1186 4ce3c06-4ce3cbb 1185->1186 1187 4ce3bd1-4ce3bfb 1185->1187 1198 4ce3d43 1186->1198 1199 4ce3cc1-4ce3cff 1186->1199 1187->1186 1200 4ce41dd-4ce41e8 1198->1200 1199->1198 1201 4ce41ee-4ce41f5 1200->1201 1202 4ce3d48-4ce3d66 1200->1202 1206 4ce3d68-4ce3d6e 1202->1206 1207 4ce3d71-4ce3d7c 1202->1207 1206->1207 1210 4ce3d82-4ce3d96 1207->1210 1211 4ce4193-4ce41db 1207->1211 1213 4ce3e0e-4ce3e1f 1210->1213 1214 4ce3d98-4ce3dca 1210->1214 1211->1200 1216 4ce3e6f-4ce3e7d 1213->1216 1217 4ce3e21-4ce3e4b 1213->1217 1214->1213 1218 4ce3e83-4ce3f36 1216->1218 1219 4ce4191 1216->1219 1217->1216 1227 4ce3e4d-4ce3e67 1217->1227 1240 4ce3f3c-4ce3fbf 1218->1240 1241 4ce3fc6-4ce40bd 1218->1241 1219->1200 1227->1216 1240->1241 1256 4ce414d 1241->1256 1257 4ce40c3-4ce4146 1241->1257 1256->1219 1257->1256 1263->1185 1264->1185 1265->1185
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1679725755.0000000004CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4ce0000_gReXLT7XjR.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \Ok$2k
                                    • API String ID: 0-3697909212
                                    • Opcode ID: 8987bf5cc5cee2a957da94c3884897c27a574276bf78e23f120870cc35e9bf48
                                    • Instruction ID: 6094b0009313648997ff02d319a1f010ecffd1419cafa8bb3c3ac816121b61b3
                                    • Opcode Fuzzy Hash: 8987bf5cc5cee2a957da94c3884897c27a574276bf78e23f120870cc35e9bf48
                                    • Instruction Fuzzy Hash: 20324A34A00218CFCB28EF75D955BECB7B2AF48308F1045A9D509AB7A4DB399E85CF50

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1266 4ce00b8-4ce00cd 1288 4ce00d0 call dfa20c 1266->1288 1289 4ce00d0 call dfa23a 1266->1289 1290 4ce00d0 call e10606 1266->1290 1268 4ce00d5-4ce00f7 1271 4ce010b-4ce01d5 1268->1271 1272 4ce00f9-4ce010a 1268->1272 1291 4ce01d5 call 4ce39bf 1271->1291 1292 4ce01d5 call 4ce3b18 1271->1292 1293 4ce01d5 call e10606 1271->1293 1294 4ce01d5 call 4ce3802 1271->1294 1287 4ce01db-4ce01de 1288->1268 1289->1268 1290->1268 1291->1287 1292->1287 1293->1287 1294->1287
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1679725755.0000000004CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4ce0000_gReXLT7XjR.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 2k$2k
                                    • API String ID: 0-107389494
                                    • Opcode ID: 1277dfcdf61ddc77fc0da6ff302bc5a06765267b9d4fc33162a18a739286f07d
                                    • Instruction ID: 0f555f34eb6ed18d07f55cef58f48049df4439b842dbcadd7c2a94dc495de76f
                                    • Opcode Fuzzy Hash: 1277dfcdf61ddc77fc0da6ff302bc5a06765267b9d4fc33162a18a739286f07d
                                    • Instruction Fuzzy Hash: 7331D6316043409FC715A7759852AAE3BA79B82358B2485BEE001DF3D2CF7A4C89C792

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1295 4ce0118-4ce0169 1300 4ce0174-4ce017a 1295->1300 1301 4ce0181-4ce01bd 1300->1301 1306 4ce01c8-4ce01d5 1301->1306 1309 4ce01d5 call 4ce39bf 1306->1309 1310 4ce01d5 call 4ce3b18 1306->1310 1311 4ce01d5 call e10606 1306->1311 1312 4ce01d5 call 4ce3802 1306->1312 1308 4ce01db-4ce01de 1309->1308 1310->1308 1311->1308 1312->1308
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1679725755.0000000004CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4ce0000_gReXLT7XjR.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 2k$2k
                                    • API String ID: 0-107389494
                                    • Opcode ID: 42bc8e80d877f83967041ef085fcd41edf0b2c0a838a9d8c2924e08786ada3e0
                                    • Instruction ID: f5c84a36861673d9afe6e7eb430ba39b102c09773efcc21a17be28dbd64c817d
                                    • Opcode Fuzzy Hash: 42bc8e80d877f83967041ef085fcd41edf0b2c0a838a9d8c2924e08786ada3e0
                                    • Instruction Fuzzy Hash: 2B1106356042004FC318B739A4526BA33AB9BC239C32455BED001EB396CFAE4C89C7E2

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1313 dfaa75-dfaafe 1317 dfab03-dfab0f 1313->1317 1318 dfab00 1313->1318 1319 dfab14-dfab1d 1317->1319 1320 dfab11 1317->1320 1318->1317 1321 dfab1f-dfab43 CreateFileW 1319->1321 1322 dfab6e-dfab73 1319->1322 1320->1319 1325 dfab75-dfab7a 1321->1325 1326 dfab45-dfab6b 1321->1326 1322->1321 1325->1326
                                    APIs
                                    • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 00DFAB25
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1679109040.0000000000DFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DFA000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_dfa000_gReXLT7XjR.jbxd
                                    Similarity
                                    • API ID: CreateFile
                                    • String ID:
                                    • API String ID: 823142352-0
                                    • Opcode ID: 32fb3f685f420239258dfa96e0eb11b981bf3ef7527927e64733fa1f914e0657
                                    • Instruction ID: 9f48f1959a40a232cb25fbd27be5b8d47e835429bf453128a454f18811d9c8c1
                                    • Opcode Fuzzy Hash: 32fb3f685f420239258dfa96e0eb11b981bf3ef7527927e64733fa1f914e0657
                                    • Instruction Fuzzy Hash: E0319EB1504344AFE722CF25DC84B66BBF8EF05310F08889AE9898B652D375E808CB71

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1329 dfb036-dfb0b9 1333 dfb0be-dfb0c7 1329->1333 1334 dfb0bb 1329->1334 1335 dfb0cc-dfb0d5 1333->1335 1336 dfb0c9 1333->1336 1334->1333 1337 dfb0d7-dfb0fb CreateMutexW 1335->1337 1338 dfb126-dfb12b 1335->1338 1336->1335 1341 dfb12d-dfb132 1337->1341 1342 dfb0fd-dfb123 1337->1342 1338->1337 1341->1342
                                    APIs
                                    • CreateMutexW.KERNELBASE(?,?), ref: 00DFB0DD
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1679109040.0000000000DFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DFA000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_dfa000_gReXLT7XjR.jbxd
                                    Similarity
                                    • API ID: CreateMutex
                                    • String ID:
                                    • API String ID: 1964310414-0
                                    • Opcode ID: 506b1dd846e40fac1ac562803928eaba00c30da8f5e11ec796014bb5b46c44e8
                                    • Instruction ID: 6b3aed08b612a382e5123193672f0ad14afb3489de82e28abed49ac6a8d9e380
                                    • Opcode Fuzzy Hash: 506b1dd846e40fac1ac562803928eaba00c30da8f5e11ec796014bb5b46c44e8
                                    • Instruction Fuzzy Hash: 1A31A1B15093846FE721CB25DD55BA6BFF8EF06310F08849AE944CB292D374A908CB72

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1345 dfa6ce-dfa72b 1346 dfa72e-dfa786 OleGetClipboard 1345->1346 1348 dfa78c-dfa7a2 1346->1348
                                    APIs
                                    • OleGetClipboard.OLE32(?,00000E24,?,?), ref: 00DFA77E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1679109040.0000000000DFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DFA000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_dfa000_gReXLT7XjR.jbxd
                                    Similarity
                                    • API ID: Clipboard
                                    • String ID:
                                    • API String ID: 220874293-0
                                    • Opcode ID: 00c9c5a36ca0cb7ee851c09fd5fe8661ffb516304afef2c2c7de851f221f0a75
                                    • Instruction ID: b72b95159fab9d0270b5527adbada1806ab6ecfaaf547f1d3b29934f122f8ab2
                                    • Opcode Fuzzy Hash: 00c9c5a36ca0cb7ee851c09fd5fe8661ffb516304afef2c2c7de851f221f0a75
                                    • Instruction Fuzzy Hash: 8D31807504D3C06FD3138B259C61B61BFB4EF47610F0A44DBE884CB6A3D2296919D7B2

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1349 dfae77-dfaf05 1353 dfaf49-dfaf4e 1349->1353 1354 dfaf07-dfaf27 WriteFile 1349->1354 1353->1354 1357 dfaf29-dfaf46 1354->1357 1358 dfaf50-dfaf55 1354->1358 1358->1357
                                    APIs
                                    • WriteFile.KERNELBASE(?,00000E24,E8FD579D,00000000,00000000,00000000,00000000), ref: 00DFAF0D
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1679109040.0000000000DFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DFA000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_dfa000_gReXLT7XjR.jbxd
                                    Similarity
                                    • API ID: FileWrite
                                    • String ID:
                                    • API String ID: 3934441357-0
                                    • Opcode ID: bcc89e11c35ec6c942e8483832a9f7874c4a933d0e09935eb8f2ef7c9ff0ec2c
                                    • Instruction ID: be2008b2711eb6ec9581fcbb71bb3ac5f0eef182802dfa483591939d94515281
                                    • Opcode Fuzzy Hash: bcc89e11c35ec6c942e8483832a9f7874c4a933d0e09935eb8f2ef7c9ff0ec2c
                                    • Instruction Fuzzy Hash: 3B21E5B2408380AFE722CF55DD44F96BFB8EF06314F09849AE9849F153D234A908CB71

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1361 dfaaa6-dfaafe 1364 dfab03-dfab0f 1361->1364 1365 dfab00 1361->1365 1366 dfab14-dfab1d 1364->1366 1367 dfab11 1364->1367 1365->1364 1368 dfab1f-dfab27 CreateFileW 1366->1368 1369 dfab6e-dfab73 1366->1369 1367->1366 1371 dfab2d-dfab43 1368->1371 1369->1368 1372 dfab75-dfab7a 1371->1372 1373 dfab45-dfab6b 1371->1373 1372->1373
                                    APIs
                                    • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 00DFAB25
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1679109040.0000000000DFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DFA000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_dfa000_gReXLT7XjR.jbxd
                                    Similarity
                                    • API ID: CreateFile
                                    • String ID:
                                    • API String ID: 823142352-0
                                    • Opcode ID: 942de46eccaa917009c6a0be8abddc0ddb8a668fb95ba5d18525dffb7fd47316
                                    • Instruction ID: 19b3a43f00d7ab1db8933aa399cf7021ff9f4843d232d72991ec834dfd17b0a9
                                    • Opcode Fuzzy Hash: 942de46eccaa917009c6a0be8abddc0ddb8a668fb95ba5d18525dffb7fd47316
                                    • Instruction Fuzzy Hash: 402181B1500604AFE721CF69DD45B66FBE8EF08310F188969EA498B651D375E908CB72

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1376 dfa9bf-dfaa3c 1381 dfaa3e-dfaa51 SetErrorMode 1376->1381 1382 dfaa67-dfaa6c 1376->1382 1383 dfaa6e-dfaa73 1381->1383 1384 dfaa53-dfaa66 1381->1384 1382->1381 1383->1384
                                    APIs
                                    • SetErrorMode.KERNELBASE(?), ref: 00DFAA44
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1679109040.0000000000DFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DFA000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_dfa000_gReXLT7XjR.jbxd
                                    Similarity
                                    • API ID: ErrorMode
                                    • String ID:
                                    • API String ID: 2340568224-0
                                    • Opcode ID: 0db70d0015ef123d35152da873a5cddda4340b193f4285396f5ab61330bc58e1
                                    • Instruction ID: 55ca3e58b253c62dca2ea628adf1581a79ba2629088ff3a190a7f0e07e3888bc
                                    • Opcode Fuzzy Hash: 0db70d0015ef123d35152da873a5cddda4340b193f4285396f5ab61330bc58e1
                                    • Instruction Fuzzy Hash: A52148A540E7C49FD7138B259C64A61BFB4AF57624F0E80DBD9848F6A3D268580CCB72

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1387 dfac37-dfacb5 1391 dfacea-dfacef 1387->1391 1392 dfacb7-dfacca GetFileType 1387->1392 1391->1392 1393 dfaccc-dface9 1392->1393 1394 dfacf1-dfacf6 1392->1394 1394->1393
                                    APIs
                                    • GetFileType.KERNELBASE(?,00000E24,E8FD579D,00000000,00000000,00000000,00000000), ref: 00DFACBD
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1679109040.0000000000DFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DFA000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_dfa000_gReXLT7XjR.jbxd
                                    Similarity
                                    • API ID: FileType
                                    • String ID:
                                    • API String ID: 3081899298-0
                                    • Opcode ID: 365437948556b55fbee4712358620fecfcd146f2c75e21685ac2a89ebee4b5a9
                                    • Instruction ID: e96df6b2fb85ab621c14c63c99c29d4d81d8118c38ffb31e35ccee4b2486cf8f
                                    • Opcode Fuzzy Hash: 365437948556b55fbee4712358620fecfcd146f2c75e21685ac2a89ebee4b5a9
                                    • Instruction Fuzzy Hash: 582108B54083846FE7128B15DC40BA2BFBCDF46314F0884D6E9848F293D264AD09C771

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1398 dfb06a-dfb0b9 1401 dfb0be-dfb0c7 1398->1401 1402 dfb0bb 1398->1402 1403 dfb0cc-dfb0d5 1401->1403 1404 dfb0c9 1401->1404 1402->1401 1405 dfb0d7-dfb0df CreateMutexW 1403->1405 1406 dfb126-dfb12b 1403->1406 1404->1403 1407 dfb0e5-dfb0fb 1405->1407 1406->1405 1409 dfb12d-dfb132 1407->1409 1410 dfb0fd-dfb123 1407->1410 1409->1410
                                    APIs
                                    • CreateMutexW.KERNELBASE(?,?), ref: 00DFB0DD
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1679109040.0000000000DFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DFA000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_dfa000_gReXLT7XjR.jbxd
                                    Similarity
                                    • API ID: CreateMutex
                                    • String ID:
                                    • API String ID: 1964310414-0
                                    • Opcode ID: 6612186a3595098f6baf6c1836ddbf6cf0ef3c47e857d0ceedcf04f6b956c532
                                    • Instruction ID: f14f5fafeeb42a9f50d9845aa136e42413341717dd6b237c415f2da666a71b49
                                    • Opcode Fuzzy Hash: 6612186a3595098f6baf6c1836ddbf6cf0ef3c47e857d0ceedcf04f6b956c532
                                    • Instruction Fuzzy Hash: 402183716002449FE720DF29DD45BA6FBE8EF09324F18C86AEE458B681D775E908CA71

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1413 dfa61e-dfa688 1415 dfa68a-dfa692 OleInitialize 1413->1415 1416 dfa6c0-dfa6c5 1413->1416 1417 dfa698-dfa6aa 1415->1417 1416->1415 1419 dfa6ac-dfa6bf 1417->1419 1420 dfa6c7-dfa6cc 1417->1420 1420->1419
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1679109040.0000000000DFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DFA000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_dfa000_gReXLT7XjR.jbxd
                                    Similarity
                                    • API ID: Initialize
                                    • String ID:
                                    • API String ID: 2538663250-0
                                    • Opcode ID: 784c0ead42aece7c142c280c14566f88f208b9d1516a2e2196e12f7f55f1c0fa
                                    • Instruction ID: 8e32a355dfbdcadf9df77ea82bd78c7714622de8dabcada5bcc35b72f111bfe8
                                    • Opcode Fuzzy Hash: 784c0ead42aece7c142c280c14566f88f208b9d1516a2e2196e12f7f55f1c0fa
                                    • Instruction Fuzzy Hash: 79213B7150D7C45FDB138B259C94652BFB4DF07220F0E84DBD9849F1A3D2695908CBB2
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00DFA5DE
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1679109040.0000000000DFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DFA000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_dfa000_gReXLT7XjR.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: 7fd8cfca29ed0773a3fa63dddbb20976c1ca0dd8264cedc9bc62ec28587ed68d
                                    • Instruction ID: af8221a747e22b474ee5b23cce1b660416a2229c88166d459bec490cc67ebbe6
                                    • Opcode Fuzzy Hash: 7fd8cfca29ed0773a3fa63dddbb20976c1ca0dd8264cedc9bc62ec28587ed68d
                                    • Instruction Fuzzy Hash: 0411A571408780AFDB228F54DC44A62FFF4EF4A310F08889AEA858B552D235A818DB71
                                    APIs
                                    • WriteFile.KERNELBASE(?,00000E24,E8FD579D,00000000,00000000,00000000,00000000), ref: 00DFAF0D
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1679109040.0000000000DFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DFA000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_dfa000_gReXLT7XjR.jbxd
                                    Similarity
                                    • API ID: FileWrite
                                    • String ID:
                                    • API String ID: 3934441357-0
                                    • Opcode ID: 666ac18b2424afb21015c9b090a8535a371d63548170934ec84afbd79b88c4bd
                                    • Instruction ID: c3396156e2b1701f41d1d7840ee61c33ec61959eef69ad53e0af9e4622cde8aa
                                    • Opcode Fuzzy Hash: 666ac18b2424afb21015c9b090a8535a371d63548170934ec84afbd79b88c4bd
                                    • Instruction Fuzzy Hash: A71193B1500604AEE7218F59DD44BA6BBE8EF04314F18C86AEA499A651D275A5088BB2
                                    APIs
                                    • ShellExecuteExW.SHELL32(?), ref: 00DFB480
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1679109040.0000000000DFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DFA000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_dfa000_gReXLT7XjR.jbxd
                                    Similarity
                                    • API ID: ExecuteShell
                                    • String ID:
                                    • API String ID: 587946157-0
                                    • Opcode ID: b13677a3e197ab6349574b3ee12883fa6bd3aa37b0094a4a35c4903c0980768b
                                    • Instruction ID: 3f9342dee9aa5cd5788b4422c5cb5b22f9caf63f2782cde03f5e5612305ebb11
                                    • Opcode Fuzzy Hash: b13677a3e197ab6349574b3ee12883fa6bd3aa37b0094a4a35c4903c0980768b
                                    • Instruction Fuzzy Hash: 991181715093849FD711CF25DD54B52BFA89F06224F0984ABED45CB252D264A908CB61
                                    APIs
                                    • GetFileType.KERNELBASE(?,00000E24,E8FD579D,00000000,00000000,00000000,00000000), ref: 00DFACBD
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1679109040.0000000000DFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DFA000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_dfa000_gReXLT7XjR.jbxd
                                    Similarity
                                    • API ID: FileType
                                    • String ID:
                                    • API String ID: 3081899298-0
                                    • Opcode ID: 728c24ba4ca0a858cd0d2ee9805df207aa3ce1049976192e787a58304bdc4ace
                                    • Instruction ID: f503b5207c9d3301ce2b2586bfc71a1053145778a59dcdd67ec5705774e6e834
                                    • Opcode Fuzzy Hash: 728c24ba4ca0a858cd0d2ee9805df207aa3ce1049976192e787a58304bdc4ace
                                    • Instruction Fuzzy Hash: 040126B5500304AFE720CB09DD84BB6F7A8DF04724F18C466EE098B741D374E8488AB2
                                    APIs
                                    • ShellExecuteExW.SHELL32(?), ref: 00DFB480
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1679109040.0000000000DFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DFA000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_dfa000_gReXLT7XjR.jbxd
                                    Similarity
                                    • API ID: ExecuteShell
                                    • String ID:
                                    • API String ID: 587946157-0
                                    • Opcode ID: 0eec9dcac361b8db16fe724dacf97a7b38d341c801b4095b2b762fc081790048
                                    • Instruction ID: cb8c55ace03e0c1e301e19e030e566f49a1d41e0559556672ba171732d7ee5a9
                                    • Opcode Fuzzy Hash: 0eec9dcac361b8db16fe724dacf97a7b38d341c801b4095b2b762fc081790048
                                    • Instruction Fuzzy Hash: CA016D716002088FDB10CF19DA84766BBE8DF04224F18C4ABDE49CB652D379E844CAB1
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00DFA5DE
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1679109040.0000000000DFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DFA000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_dfa000_gReXLT7XjR.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: ef46f943a155842bc395a52e12d4df7430d8b8de92ae7a5d45e137c688d267d3
                                    • Instruction ID: fbf4d0bae7b97d88b78463190f56fcaeed5208049e24d39c5a2b51418a2004cf
                                    • Opcode Fuzzy Hash: ef46f943a155842bc395a52e12d4df7430d8b8de92ae7a5d45e137c688d267d3
                                    • Instruction Fuzzy Hash: 8101A1724007449FDB208F59D944B62FFE0EF08710F08C8AADE898A651D336E414DF72
                                    APIs
                                    • OleGetClipboard.OLE32(?,00000E24,?,?), ref: 00DFA77E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1679109040.0000000000DFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DFA000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_dfa000_gReXLT7XjR.jbxd
                                    Similarity
                                    • API ID: Clipboard
                                    • String ID:
                                    • API String ID: 220874293-0
                                    • Opcode ID: 88784245585e5ea71dda396716bba30904db3d7d781a876143265a188e50185d
                                    • Instruction ID: fbd8883aefd79b821f9cf2028dac0f94dbe42653a95e459d25a164287ce4635a
                                    • Opcode Fuzzy Hash: 88784245585e5ea71dda396716bba30904db3d7d781a876143265a188e50185d
                                    • Instruction Fuzzy Hash: 7A01A271500201ABD350DF1ACD46B66FBE8FB88A20F148159ED089BB41E731F915CBE6
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1679109040.0000000000DFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DFA000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_dfa000_gReXLT7XjR.jbxd
                                    Similarity
                                    • API ID: Initialize
                                    • String ID:
                                    • API String ID: 2538663250-0
                                    • Opcode ID: 185a0959b8a96ea7dd174df26d6ff6ead73d52fd0ebdc40ec3f77317831fe0d1
                                    • Instruction ID: 85f663bf77bc122e491c7552d327092603713341b1e41ed5ad8415c04fee7bd2
                                    • Opcode Fuzzy Hash: 185a0959b8a96ea7dd174df26d6ff6ead73d52fd0ebdc40ec3f77317831fe0d1
                                    • Instruction Fuzzy Hash: 1C01F2B15006048FDB10CF09D884765FBE4DF04320F1DC4AACE498F252D279E804CEB2
                                    APIs
                                    • SetErrorMode.KERNELBASE(?), ref: 00DFAA44
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1679109040.0000000000DFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DFA000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_dfa000_gReXLT7XjR.jbxd
                                    Similarity
                                    • API ID: ErrorMode
                                    • String ID:
                                    • API String ID: 2340568224-0
                                    • Opcode ID: 586443cc4d1fe18098b9ec0a4f0de64c18ad4b9f94d6b9650c0d0a4c16cc375a
                                    • Instruction ID: c47202655a1dde73f78be8c1536cf9c46166b8fd388223dfbceed5de9f2aa565
                                    • Opcode Fuzzy Hash: 586443cc4d1fe18098b9ec0a4f0de64c18ad4b9f94d6b9650c0d0a4c16cc375a
                                    • Instruction Fuzzy Hash: 00F0A4755006489FDB208F09D984765FBE4DF04724F18C0AADE494B752D279E948CEB2
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1679725755.0000000004CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4ce0000_gReXLT7XjR.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 2k
                                    • API String ID: 0-1599061190
                                    • Opcode ID: 213c3f85d90077f76330f8ec19c184b09116d9e09007677940b6eb7c49ef1937
                                    • Instruction ID: ad9e36aaf35649d5c1b499b665cb705c0ec5d82c36e4a0b14e495a2de865664a
                                    • Opcode Fuzzy Hash: 213c3f85d90077f76330f8ec19c184b09116d9e09007677940b6eb7c49ef1937
                                    • Instruction Fuzzy Hash: 3481BF30A002188FCB18EFB5C945BECB7B2AF44308F1041A9D50AAB7A4DB799E85CF51
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1679725755.0000000004CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4ce0000_gReXLT7XjR.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 2k
                                    • API String ID: 0-1599061190
                                    • Opcode ID: f582c9eb7c8ed0dd0e088e944dd934cd6ca547a11e4108418c2f4146dd97fbac
                                    • Instruction ID: 1985d066a5ae1d1b871663753dcc42dcc6f2326b7ac9edd74a9d104a21e3b249
                                    • Opcode Fuzzy Hash: f582c9eb7c8ed0dd0e088e944dd934cd6ca547a11e4108418c2f4146dd97fbac
                                    • Instruction Fuzzy Hash: 9B418134A00258CFDB14EFBAC955BECB7B2BF44308F1041AAD405AB694DB795E85CF61
                                    APIs
                                    • CloseHandle.KERNELBASE(?), ref: 00DFABF0
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1679109040.0000000000DFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DFA000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_dfa000_gReXLT7XjR.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: 5e51b5a07a01098e7c800b32a63dcb3efe45b8131ecad93a9ada7c083da40f08
                                    • Instruction ID: f00b5386ee9a3af5b33547116ea61c5b382beee0167977fc7038cb63f3ea5fa9
                                    • Opcode Fuzzy Hash: 5e51b5a07a01098e7c800b32a63dcb3efe45b8131ecad93a9ada7c083da40f08
                                    • Instruction Fuzzy Hash: F521C2B55097C49FD7128B25DC95652BFB8EF07220F0D84DBDD858F2A3D2645908CB72
                                    APIs
                                    • CloseHandle.KERNELBASE(?), ref: 00DFABF0
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1679109040.0000000000DFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DFA000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_dfa000_gReXLT7XjR.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: 19077c13cba3829737abdb22f642d2584455a67fd8c08386e4f7e08db567fc0c
                                    • Instruction ID: eeffce8952219cfde3cb093ae0fb688ba882001796f00f673efa727663e777e5
                                    • Opcode Fuzzy Hash: 19077c13cba3829737abdb22f642d2584455a67fd8c08386e4f7e08db567fc0c
                                    • Instruction Fuzzy Hash: AB0184755042448FDB108F19D985765FBE4DF04320F1CC4AADE498F655D279D844CAB2
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1679725755.0000000004CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4ce0000_gReXLT7XjR.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ada8e2424057887110807636d7ff10dc4e6b09ec47c28ee25576b3ee4b0035aa
                                    • Instruction ID: dfb9b75943bd33f13424417035e9c1130cf21c35f7a62599b2b6d88c02587eca
                                    • Opcode Fuzzy Hash: ada8e2424057887110807636d7ff10dc4e6b09ec47c28ee25576b3ee4b0035aa
                                    • Instruction Fuzzy Hash: 0B310530B002118FC714BB7ADA117BE33A79B8820CF50443A950597BA4DF7CAD4A9BD1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1679725755.0000000004CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4ce0000_gReXLT7XjR.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0df6ee2811d64638e1305e366641cb97081a84f4395c868373c87f9ab2b84ddb
                                    • Instruction ID: 649c1ba59dfa919b8dce2af032ad43545e591ab9078144d361310d4443da0efc
                                    • Opcode Fuzzy Hash: 0df6ee2811d64638e1305e366641cb97081a84f4395c868373c87f9ab2b84ddb
                                    • Instruction Fuzzy Hash: E711E26540F3C15FD35387349C666813FB1AE13218B4A81DBD080CA5A7E26D0A4EC7A2
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1679725755.0000000004CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4ce0000_gReXLT7XjR.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c5f274fdec9fa08c887b9e4f49e73cc393161229510813042e1c35a761fc37be
                                    • Instruction ID: 65e6761b0d13c21d68781b81d56687546ffbd3c6a8db21c9f0b106c4b30b9ba7
                                    • Opcode Fuzzy Hash: c5f274fdec9fa08c887b9e4f49e73cc393161229510813042e1c35a761fc37be
                                    • Instruction Fuzzy Hash: F6F0C232A04304AFDB14DBB18C52BAE7B629F81324F24866EE541EB1C1DA765881C780
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1679220644.0000000000E10000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_e10000_gReXLT7XjR.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 76fe5f21f4476b0952f21030b7a02ddba364190dc5b5210f61d977003eb8848b
                                    • Instruction ID: 5e96b0ccd23567a0e60ec41d22c6b930bd5ee7bb0493b416548a7ae2d4c9051d
                                    • Opcode Fuzzy Hash: 76fe5f21f4476b0952f21030b7a02ddba364190dc5b5210f61d977003eb8848b
                                    • Instruction Fuzzy Hash: 89E092B66006048BD750CF0AFC81452F7D8EB88630718C47FDC0D8BB01E235B508CEA5
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1679725755.0000000004CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4ce0000_gReXLT7XjR.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b431226819f01377d96b05dc1c9c67f59420ae9030fb16814ef54135c5a39e7e
                                    • Instruction ID: 7a8a9cb11d70513561f825ee2dbdf8903773ed0fffcb2a6694484f9e400ccccb
                                    • Opcode Fuzzy Hash: b431226819f01377d96b05dc1c9c67f59420ae9030fb16814ef54135c5a39e7e
                                    • Instruction Fuzzy Hash: 6BE0C230246395CFCB0A2B75A02442837B5AB4231A34004BFC5414B7A1DB3AA8C6CB50
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1679092600.0000000000DF2000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DF2000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_df2000_gReXLT7XjR.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0d4f09d382ed54d04a59a414e43f069fe484dd2b2cdfada7acba86d2aaeb611c
                                    • Instruction ID: c127f02d9892454ab94cdb47d8f68ab9aa2b4347dc856c28bab7af61ac1137b1
                                    • Opcode Fuzzy Hash: 0d4f09d382ed54d04a59a414e43f069fe484dd2b2cdfada7acba86d2aaeb611c
                                    • Instruction Fuzzy Hash: 9AD02E392006C04FD3238A0CC2A5FA537D4AB60708F4B84FAA800CB763C7A8D880C220
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1679092600.0000000000DF2000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DF2000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_df2000_gReXLT7XjR.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9ded9e5951d81df3f9f38446e209e2e171950dacb38fbc38d29f9d33bdcb9ce0
                                    • Instruction ID: fd99f6079fa920f4095bd79e71f33c35b98a1a3aba6c3ac11ca44f182859fd4c
                                    • Opcode Fuzzy Hash: 9ded9e5951d81df3f9f38446e209e2e171950dacb38fbc38d29f9d33bdcb9ce0
                                    • Instruction Fuzzy Hash: 4CD05E742006854FC725DB0CC2D4F6937D4AF40714F0A84ECAC108B762C7A9D8C4DA10
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1679725755.0000000004CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4ce0000_gReXLT7XjR.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $\Ok$|t$2k
                                    • API String ID: 0-3739186446
                                    • Opcode ID: aa75c52b11177fddadca1c179ac42d6baa6ea0d0f5aa009e64139f2ef1d6e57c
                                    • Instruction ID: be578ad06046956c394463fd847100161fca6e5a45406e0edabb3df2d68df396
                                    • Opcode Fuzzy Hash: aa75c52b11177fddadca1c179ac42d6baa6ea0d0f5aa009e64139f2ef1d6e57c
                                    • Instruction Fuzzy Hash: B2034C74A01228CFDB28EF35D994BA9B7B2FB48308F1041EAD949677A4DB355E84CF50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1679725755.0000000004CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4ce0000_gReXLT7XjR.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $\Ok$|t$2k
                                    • API String ID: 0-3739186446
                                    • Opcode ID: d8616eb244af821e9a474c9268100af014737fdce4bf3a8f2b194aa2a7c780df
                                    • Instruction ID: 86707985594bff85f24703ec407d2f7c1c21c3b19210593f8ee8b5d81109d0ad
                                    • Opcode Fuzzy Hash: d8616eb244af821e9a474c9268100af014737fdce4bf3a8f2b194aa2a7c780df
                                    • Instruction Fuzzy Hash: 0C033C74A01228CFDB28EF35D994BA9B7B2FB48308F1041EAD949677A4DB355E84CF50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1679725755.0000000004CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4ce0000_gReXLT7XjR.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $\Ok$|t$2k
                                    • API String ID: 0-3739186446
                                    • Opcode ID: bed89104ec891f1e1d40c19029cb65b0b0873f711bfbb995da67fa7a75a80c84
                                    • Instruction ID: 5731b12c9246f06ce46e424f86abf5516efbc65335645cb33b5d662fe09989e1
                                    • Opcode Fuzzy Hash: bed89104ec891f1e1d40c19029cb65b0b0873f711bfbb995da67fa7a75a80c84
                                    • Instruction Fuzzy Hash: E5034C74A01228CFDB28EF35D994BA9B7B2FB48308F1041E9D949677A4DB355E84CF50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1679725755.0000000004CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4ce0000_gReXLT7XjR.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $\Ok$|t$2k
                                    • API String ID: 0-3739186446
                                    • Opcode ID: fe6c136f7543192fe3db8e8bc9e9a3ab9ef6f77d2d0ab7681ab048cb53600775
                                    • Instruction ID: 13974d55f3327f545e48434ca823c1edefe5cdc7e900e4f9afb6eedcea4d4e7a
                                    • Opcode Fuzzy Hash: fe6c136f7543192fe3db8e8bc9e9a3ab9ef6f77d2d0ab7681ab048cb53600775
                                    • Instruction Fuzzy Hash: 0FF24C74A01228CFDB28EF35D994BA9B7B2FB48308F1041EAD949677A4DB355E84CF50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1679725755.0000000004CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4ce0000_gReXLT7XjR.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $\Ok$|t$2k
                                    • API String ID: 0-3739186446
                                    • Opcode ID: 38f58539976a8a8ef7ac757c585fb18d838c5a0a0b4fb894d47ff9103cb383b3
                                    • Instruction ID: 95c88ee0dfe52030b2a0f061ccf7b9d7271e36a187134c7f7d9a046f7fce533c
                                    • Opcode Fuzzy Hash: 38f58539976a8a8ef7ac757c585fb18d838c5a0a0b4fb894d47ff9103cb383b3
                                    • Instruction Fuzzy Hash: 29F24C74A01228CFDB28EF35D994BA9B7B2FB48308F1041EAD949677A4DB355E84CF50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1679725755.0000000004CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4ce0000_gReXLT7XjR.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $\Ok$|t$2k
                                    • API String ID: 0-3739186446
                                    • Opcode ID: 490daa185f9669d9d283d110714f1a486994296bcf32baceb0bbc1466fc7fc95
                                    • Instruction ID: 00dcfbb58c1df7dee95643ecbfb6fc2562249e588cc298c6a34f94f0f268edbb
                                    • Opcode Fuzzy Hash: 490daa185f9669d9d283d110714f1a486994296bcf32baceb0bbc1466fc7fc95
                                    • Instruction Fuzzy Hash: 98F25C74A01228CFDB28EF35D994BA9B7B2FB48308F1041EAD949677A4DB355E84CF50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1679725755.0000000004CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4ce0000_gReXLT7XjR.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $\Ok$|t$2k
                                    • API String ID: 0-3739186446
                                    • Opcode ID: 5fdf873fbff870127a1af0f29801f97ae03fda8c19980951a216bd8291347fff
                                    • Instruction ID: 8f6200b147c5096266a6c4f1174047ee256ad3678d9a723f927c7cb29ec21a53
                                    • Opcode Fuzzy Hash: 5fdf873fbff870127a1af0f29801f97ae03fda8c19980951a216bd8291347fff
                                    • Instruction Fuzzy Hash: 89F25C74A01228CFDB28EF35D994BA9B7B2FB48308F1041EAD949677A4DB355E84CF50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1679725755.0000000004CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4ce0000_gReXLT7XjR.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $\Ok$|t$2k
                                    • API String ID: 0-3739186446
                                    • Opcode ID: 76a26d6e54009b3741a7eee2baedc7fdfd4fc2bd6b2dc6bcbc2bb817e5c8ace2
                                    • Instruction ID: c6c3bcf1f5e82eec68a96082c8272170c4f6b38368dcb12a2ee0b06c22cf5040
                                    • Opcode Fuzzy Hash: 76a26d6e54009b3741a7eee2baedc7fdfd4fc2bd6b2dc6bcbc2bb817e5c8ace2
                                    • Instruction Fuzzy Hash: 73F25B74A01228CFDB28EF35D994BA9B7B2FB48308F1041EAD949677A4DB355E84CF50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1679725755.0000000004CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4ce0000_gReXLT7XjR.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $\Ok$|t$2k
                                    • API String ID: 0-3739186446
                                    • Opcode ID: 67124619bef82e56523edc458afc4b217c3d8686ab3824ed4e270ca8644e4f14
                                    • Instruction ID: f3d5851fb143ad68bfc33e0c9e54c417e050ca32d2fa5bdb5afc31919616b1d2
                                    • Opcode Fuzzy Hash: 67124619bef82e56523edc458afc4b217c3d8686ab3824ed4e270ca8644e4f14
                                    • Instruction Fuzzy Hash: ACE26D74A01228CFDB28EF35D994BA9B7B2FB48308F1041EAD949677A4DB355E84CF50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1679725755.0000000004CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4ce0000_gReXLT7XjR.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \Ok$|t$2k
                                    • API String ID: 0-1000380826
                                    • Opcode ID: f0d72c8749e9a873f6a94440a4626981f9ae2d9ef402cd6f5dd2fe1c73999c89
                                    • Instruction ID: fdd2b26ba57fe653fc8dfb6a8654f62ea93edd2233cb562e728ba83ff8e791f1
                                    • Opcode Fuzzy Hash: f0d72c8749e9a873f6a94440a4626981f9ae2d9ef402cd6f5dd2fe1c73999c89
                                    • Instruction Fuzzy Hash: EEE25C74A01228CFDB28EF35D994BA9B7B2FB48308F1041EAD949677A4DB355E84CF50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1679725755.0000000004CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4ce0000_gReXLT7XjR.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \Ok$|t$2k
                                    • API String ID: 0-1000380826
                                    • Opcode ID: f70c40ffb5aa532b2a15eef2aff44d352d156395792943050ded40a62110ddc7
                                    • Instruction ID: e3f865780904d56471637d91e97cf2cc9473cbd68084c8373281f3f204a6002b
                                    • Opcode Fuzzy Hash: f70c40ffb5aa532b2a15eef2aff44d352d156395792943050ded40a62110ddc7
                                    • Instruction Fuzzy Hash: F4D25C74A01228CFDB29EF35D994BA9B7B2FB48308F1041E9D949673A4DB359E84CF50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1679725755.0000000004CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4ce0000_gReXLT7XjR.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \Ok$|t$2k
                                    • API String ID: 0-1000380826
                                    • Opcode ID: e5447a63c8b5f2144aae444321792df2e1643840c4e0981e0695df4bf115c564
                                    • Instruction ID: 5e801ebba66d824c00acab1d3fee0ab9b973a0c846bb4003d8a25b81eab7992d
                                    • Opcode Fuzzy Hash: e5447a63c8b5f2144aae444321792df2e1643840c4e0981e0695df4bf115c564
                                    • Instruction Fuzzy Hash: 82D25C74A01228CFDB25EF35D994BA9B7B2FB48308F1041E9D949673A4DB355E84CF50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1679725755.0000000004CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4ce0000_gReXLT7XjR.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \Ok$|t$2k
                                    • API String ID: 0-1000380826
                                    • Opcode ID: 536f3f738fe9c60178c51ec8f7f967be3e796fd6d2bb531a4817f3e47f8f5869
                                    • Instruction ID: 8f603bc41e8fe76bfeb02bcc5cade3da9e13ff53275a6120ac3f47139d46668d
                                    • Opcode Fuzzy Hash: 536f3f738fe9c60178c51ec8f7f967be3e796fd6d2bb531a4817f3e47f8f5869
                                    • Instruction Fuzzy Hash: 31D25B74A01228CFDB29EF35DA94BA9B7B2FB48308F1041E9D949673A4DB355E84CF50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1679725755.0000000004CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4ce0000_gReXLT7XjR.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \Ok$|t$2k
                                    • API String ID: 0-1000380826
                                    • Opcode ID: 827fc812f742e12eca57d7f62906e745622283c17491f639d2e36c8170c4edd0
                                    • Instruction ID: 034b940235b30ebfa15c5f421ba95863dd802d8602f68ab82d57abf3be091859
                                    • Opcode Fuzzy Hash: 827fc812f742e12eca57d7f62906e745622283c17491f639d2e36c8170c4edd0
                                    • Instruction Fuzzy Hash: B6D25B74A01228CFDB29EF35DA94BA9B7B2FB48308F1041E9D949673A4DB355E84CF50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1679725755.0000000004CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4ce0000_gReXLT7XjR.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \Ok$|t$2k
                                    • API String ID: 0-1000380826
                                    • Opcode ID: ec736dd77ca64dec0d9789a187ca998ce9d610ca27c31acb462336ce7c8a0906
                                    • Instruction ID: a65da5427e9cc74a6aca75b4b5c474e8a025b1fa9182954efc8378dce3bfd061
                                    • Opcode Fuzzy Hash: ec736dd77ca64dec0d9789a187ca998ce9d610ca27c31acb462336ce7c8a0906
                                    • Instruction Fuzzy Hash: 43D25B74A01228CFDB29EF35DA94BA9B7B2FB48308F1041E9D949673A4DB355E84CF50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1679725755.0000000004CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4ce0000_gReXLT7XjR.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \Ok$|t$2k
                                    • API String ID: 0-1000380826
                                    • Opcode ID: 13b8f7b141431b76ad395dca47e62593b1a2935e6cdc5d9d919084ab24849634
                                    • Instruction ID: ff0dc76fc92bee1e3d801f3ae1d389d9027851125fe7132f69e5911747c9e7b0
                                    • Opcode Fuzzy Hash: 13b8f7b141431b76ad395dca47e62593b1a2935e6cdc5d9d919084ab24849634
                                    • Instruction Fuzzy Hash: 78C22A74A01228CFDB25EF34D994BA9B7B2FB58308F1041E9D909677A4DB35AE85CF40
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1679725755.0000000004CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4ce0000_gReXLT7XjR.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \Ok
                                    • API String ID: 0-3677890257
                                    • Opcode ID: 09650503fc974eacbec4264d3eaa5285a482c51a418a06d1ffcfbee1d896d5f3
                                    • Instruction ID: 01ccc5c7e9c50e345d396184bcc44a7ccc2e9207ed5d5e236e5627e2adc99d0c
                                    • Opcode Fuzzy Hash: 09650503fc974eacbec4264d3eaa5285a482c51a418a06d1ffcfbee1d896d5f3
                                    • Instruction Fuzzy Hash: 4EC22A74A01228CFDB29EF34D994BA9B7B2FB58308F1041E9D909677A4DB359E85CF40
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1679725755.0000000004CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4ce0000_gReXLT7XjR.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: N$N$N$N
                                    • API String ID: 0-91100018
                                    • Opcode ID: 7755bcb6e9d2fd7956a1a09508db8dd8f6c489ee99ebf3fa129c3bdf23063417
                                    • Instruction ID: e730d2c4fce7cb7f236776b46cffbbe5e53b248637bbf4a74bfcf3f98781ba44
                                    • Opcode Fuzzy Hash: 7755bcb6e9d2fd7956a1a09508db8dd8f6c489ee99ebf3fa129c3bdf23063417
                                    • Instruction Fuzzy Hash: 68216FB57002599FEB20DA6EC941BBA73E6FF89204F140568E905EB794EB74FD018790

                                    Execution Graph

                                    Execution Coverage:37.7%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:6.1%
                                    Total number of Nodes:115
                                    Total number of Limit Nodes:7
                                    execution_graph 20634 5801d02 20636 5801d3a MapViewOfFile 20634->20636 20637 5801d89 20636->20637 20713 5802442 20716 5802477 WSAConnect 20713->20716 20715 5802496 20716->20715 20717 157aa12 20718 157aa67 20717->20718 20719 157aa3e SetErrorMode 20717->20719 20718->20719 20720 157aa53 20719->20720 20638 157a65e 20639 157a6c0 20638->20639 20640 157a68a CloseHandle 20638->20640 20639->20640 20641 157a698 20640->20641 20725 157b69e 20726 157b703 20725->20726 20727 157b6cd WaitForInputIdle 20725->20727 20726->20727 20728 157b6db 20727->20728 20642 580088a 20644 58008b6 K32EnumProcesses 20642->20644 20645 58008d2 20644->20645 20649 157b45a 20652 157b495 SendMessageTimeoutA 20649->20652 20651 157b4dd 20652->20651 20729 157a59a 20730 157a610 20729->20730 20731 157a5d8 DuplicateHandle 20729->20731 20730->20731 20732 157a5e6 20731->20732 20733 580334e 20734 5803383 SetProcessWorkingSetSize 20733->20734 20736 58033af 20734->20736 20653 157b746 20656 157b76f CopyFileW 20653->20656 20655 157b796 20656->20655 20737 157bf06 20738 157bf32 FindClose 20737->20738 20740 157bf64 20737->20740 20739 157bf47 20738->20739 20740->20738 20741 157a186 20742 157a1f3 20741->20742 20743 157a1bb send 20741->20743 20742->20743 20744 157a1c9 20743->20744 20745 5801b52 20746 5801b8a ConvertStringSecurityDescriptorToSecurityDescriptorW 20745->20746 20748 5801bcb 20746->20748 20749 157b982 20750 157b9ab SetFileAttributesW 20749->20750 20752 157b9c7 20750->20752 20657 5803196 20659 58031bf select 20657->20659 20660 58031f4 20659->20660 20661 157bc4e 20662 157bc7d AdjustTokenPrivileges 20661->20662 20664 157bc9f 20662->20664 20665 157bace 20668 157baf7 LookupPrivilegeValueW 20665->20668 20667 157bb1e 20668->20667 20669 157b8ce 20670 157b8f4 DeleteFileW 20669->20670 20672 157b910 20670->20672 20673 157bdca 20674 157bdff NtQuerySystemInformation 20673->20674 20675 157be2a 20673->20675 20676 157be14 20674->20676 20675->20674 20677 157b176 20679 157b1ae RegOpenKeyExW 20677->20679 20680 157b204 20679->20680 20757 58006e2 20760 5800717 GetExitCodeProcess 20757->20760 20759 5800740 20760->20759 20761 5802262 20763 580229d getaddrinfo 20761->20763 20764 580230f 20763->20764 20681 157b372 20682 157b3a7 RegSetValueExW 20681->20682 20684 157b3f3 20682->20684 20685 5801fa6 20686 5801fdb shutdown 20685->20686 20688 5802004 20686->20688 20689 5801726 20690 580175e WSASocketW 20689->20690 20692 580179a 20690->20692 20693 157b27e 20694 157b2b3 RegQueryValueExW 20693->20694 20696 157b307 20694->20696 20773 580326a 20775 580329f GetProcessWorkingSetSize 20773->20775 20776 58032cb 20775->20776 20777 58026ee 20779 5802729 LoadLibraryA 20777->20779 20780 5802766 20779->20780 20781 157aaa6 20782 157aade CreateFileW 20781->20782 20784 157ab2d 20782->20784 20697 5800032 20698 580006a RegCreateKeyExW 20697->20698 20700 58000dc 20698->20700 20785 5802176 20788 58021ab GetProcessTimes 20785->20788 20787 58021dd 20788->20787 20701 157adee 20702 157ae23 ReadFile 20701->20702 20704 157ae55 20702->20704 20789 157a72e 20790 157a77e OleGetClipboard 20789->20790 20791 157a78c 20790->20791 20705 58030ba 20707 58030ef ioctlsocket 20705->20707 20708 580311b 20707->20708 20709 157ac6a 20711 157ac9f GetFileType 20709->20711 20712 157accc 20711->20712 20792 157afaa 20793 157afe2 CreateMutexW 20792->20793 20795 157b025 20793->20795
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113496277.0000000005690000.00000040.00000800.00020000.00000000.sdmp, Offset: 05690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5690000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $\Ok$2k
                                    • API String ID: 0-804809350
                                    • Opcode ID: e898a08b1b5a59a4348c93928207c430b19c8d99482a4566d309dc8c6e1fd000
                                    • Instruction ID: 5b6318fa460160e0a8b05b072a7e44924fa2ac21545faab865e5a720e1012d9a
                                    • Opcode Fuzzy Hash: e898a08b1b5a59a4348c93928207c430b19c8d99482a4566d309dc8c6e1fd000
                                    • Instruction Fuzzy Hash: 7A133874A01228CFEB25DF34D894BA9B7B2FB48304F1041EAD9096B394DB399E95DF50

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1650 5694544-569467d 1668 569480d-5694821 1650->1668 1669 5694683-56947d2 1650->1669 1670 569496f-5694983 1668->1670 1671 5694827-569492c 1668->1671 1669->1668 1673 5694985-569498b call 5694210 1670->1673 1674 56949d6-56949ea 1670->1674 1863 5694934 1671->1863 1679 5694990-569499b 1673->1679 1676 56949ec-56949f7 1674->1676 1677 5694a32-5694a46 1674->1677 1676->1677 1680 5694a4c-5694b51 1677->1680 1681 5694b94-5694ba8 1677->1681 1679->1674 1904 5694b59 1680->1904 1684 5694bae-5694bc2 1681->1684 1685 5694cd4-5694ce8 1681->1685 1688 5694bd0-5694be4 1684->1688 1689 5694bc4-5694bcb 1684->1689 1692 5694cee-5694f22 1685->1692 1693 5694f74-5694f88 1685->1693 1694 5694bef-5694c03 1688->1694 1695 5694be6-5694bed 1688->1695 1697 5694c48-5694c5c 1689->1697 2164 5694f2d 1692->2164 1698 5694f8a-5694f91 1693->1698 1699 5694fe2-5694ff6 1693->1699 1700 5694c0e-5694c22 1694->1700 1701 5694c05-5694c0c 1694->1701 1695->1697 1704 5694c5e-5694c74 1697->1704 1705 5694c76-5694c82 1697->1705 1724 5694f9b 1698->1724 1702 5694ff8-5694ffe 1699->1702 1703 5695045-5695059 1699->1703 1710 5694c2d-5694c41 1700->1710 1711 5694c24-5694c2b 1700->1711 1701->1697 1702->1703 1712 569505b 1703->1712 1713 56950a2-56950b6 1703->1713 1715 5694c8d 1704->1715 1705->1715 1710->1697 1719 5694c43-5694c45 1710->1719 1711->1697 1712->1713 1720 56950b8-56950e1 1713->1720 1721 569512d-5695141 1713->1721 1715->1685 1719->1697 1720->1721 1725 56953b4-56953c8 1721->1725 1726 5695147-5695363 1721->1726 1724->1699 1732 569549e-56954b2 1725->1732 1733 56953ce-56953de 1725->1733 2110 5695365 1726->2110 2111 5695367 1726->2111 1736 56954b8-5695628 1732->1736 1737 569566f-5695683 1732->1737 2171 56953e4 call 1a905e0 1733->2171 2172 56953e4 call 1a90606 1733->2172 1736->1737 1742 5695689-569579f 1737->1742 1743 56957e6-56957fa 1737->1743 1742->1743 1745 569595d-5695971 1743->1745 1746 5695800-569590b 1743->1746 1753 5695ad4-5695ae8 1745->1753 1754 5695977-5695a82 1745->1754 2046 5695916 1746->2046 1762 5695c4b-5695c5f 1753->1762 1763 5695aee-5695bf9 1753->1763 2052 5695a8d 1754->2052 1757 56953ea-5695450 1838 5695457 1757->1838 1767 5695dc2-5695dd6 1762->1767 1768 5695c65-5695d70 1762->1768 2069 5695c04 1763->2069 1777 5695f39-5695f4d 1767->1777 1778 5695ddc-5695ef2 1767->1778 2073 5695d7b 1768->2073 1785 56960b0-56960c4 1777->1785 1786 5695f53-5696069 1777->1786 1778->1777 1791 56960ca-56961d5 1785->1791 1792 5696227-569623b 1785->1792 1786->1785 2105 56961e0 1791->2105 1801 569639e-56963b2 1792->1801 1802 5696241-569634c 1792->1802 1807 56963b8-56963fd call 5694278 1801->1807 1808 5696536-569654a 1801->1808 2113 5696357 1802->2113 1939 56964bd-56964df 1807->1939 1824 569668d-56966a1 1808->1824 1825 5696550-569656f 1808->1825 1836 56967ee-5696802 1824->1836 1837 56966a7-56967a7 1824->1837 1858 5696614-5696636 1825->1858 1844 5696808-5696908 1836->1844 1845 569694f-5696963 1836->1845 1837->1836 1838->1732 1844->1845 1852 5696969-5696a69 1845->1852 1853 5696ab0-5696ada 1845->1853 1852->1853 1874 5696b9a-5696bae 1853->1874 1875 5696ae0-5696b53 1853->1875 1871 569663c 1858->1871 1872 5696574-5696583 1858->1872 1863->1670 1871->1824 1878 5696589-56965bc 1872->1878 1879 569663e 1872->1879 1888 5696c8b-5696c9f 1874->1888 1889 5696bb4-5696c0b 1874->1889 1875->1874 1968 56965be-56965f8 1878->1968 1969 5696603-569660c 1878->1969 1910 5696643-569668b 1879->1910 1908 5696de5-5696df9 1888->1908 1909 5696ca5-5696d97 1888->1909 2014 5696c12-5696c44 1889->2014 1904->1681 1916 569705c-5697070 1908->1916 1917 5696dff-5696e4f 1908->1917 2144 5696d9e 1909->2144 1910->1824 1930 5697158-569715f 1916->1930 1931 5697076-5697111 call 5694278 * 2 1916->1931 2024 5696ebd-5696ee8 1917->2024 2025 5696e51-5696e77 1917->2025 1931->1930 1957 5696402-5696411 1939->1957 1958 56964e5 1939->1958 1965 56964e7 1957->1965 1966 5696417-5696477 1957->1966 1958->1808 1998 56964ec-5696534 1965->1998 2091 5696481-56964b5 1966->2091 1968->1969 1969->1910 1980 569660e 1969->1980 1980->1858 1998->1808 2014->1888 2108 5696eee-5696fc1 2024->2108 2109 5696fc6-5697057 2024->2109 2103 5696e79-5696e99 2025->2103 2104 5696eb8 2025->2104 2046->1745 2052->1753 2069->1762 2073->1767 2091->1998 2107 56964b7 2091->2107 2103->2104 2104->1916 2105->1792 2107->1939 2108->1916 2109->1916 2114 569536d 2110->2114 2111->2114 2173 5695367 call 5697350 2111->2173 2113->1801 2114->1725 2144->1908 2164->1693 2171->1757 2172->1757 2173->2114
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113496277.0000000005690000.00000040.00000800.00020000.00000000.sdmp, Offset: 05690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5690000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $\Ok$2k
                                    • API String ID: 0-804809350
                                    • Opcode ID: 3b9c57436142020b0cf3b11a956a75f8222b75f6c98c11cff8fbc927b15860ab
                                    • Instruction ID: 1300cab45ca1bda727a5cd0444298212f2e3c18f24a49519b0e04f5f0adde8e2
                                    • Opcode Fuzzy Hash: 3b9c57436142020b0cf3b11a956a75f8222b75f6c98c11cff8fbc927b15860ab
                                    • Instruction Fuzzy Hash: A9033874A01228CFEB25DF34D894BA9B7B2FB48304F1041EAD9096B394DB399E95DF50

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2174 5694630-569467d 2181 569480d-5694821 2174->2181 2182 5694683-56947d2 2174->2182 2183 569496f-5694983 2181->2183 2184 5694827-569492c 2181->2184 2182->2181 2186 5694985-569498b call 5694210 2183->2186 2187 56949d6-56949ea 2183->2187 2376 5694934 2184->2376 2192 5694990-569499b 2186->2192 2189 56949ec-56949f7 2187->2189 2190 5694a32-5694a46 2187->2190 2189->2190 2193 5694a4c-5694b51 2190->2193 2194 5694b94-5694ba8 2190->2194 2192->2187 2417 5694b59 2193->2417 2197 5694bae-5694bc2 2194->2197 2198 5694cd4-5694ce8 2194->2198 2201 5694bd0-5694be4 2197->2201 2202 5694bc4-5694bcb 2197->2202 2205 5694cee-5694f22 2198->2205 2206 5694f74-5694f88 2198->2206 2207 5694bef-5694c03 2201->2207 2208 5694be6-5694bed 2201->2208 2210 5694c48-5694c5c 2202->2210 2677 5694f2d 2205->2677 2211 5694f8a-5694f91 2206->2211 2212 5694fe2-5694ff6 2206->2212 2213 5694c0e-5694c22 2207->2213 2214 5694c05-5694c0c 2207->2214 2208->2210 2217 5694c5e-5694c74 2210->2217 2218 5694c76-5694c82 2210->2218 2237 5694f9b 2211->2237 2215 5694ff8-5694ffe 2212->2215 2216 5695045-5695059 2212->2216 2223 5694c2d-5694c41 2213->2223 2224 5694c24-5694c2b 2213->2224 2214->2210 2215->2216 2225 569505b 2216->2225 2226 56950a2-56950b6 2216->2226 2228 5694c8d 2217->2228 2218->2228 2223->2210 2232 5694c43-5694c45 2223->2232 2224->2210 2225->2226 2233 56950b8-56950e1 2226->2233 2234 569512d-5695141 2226->2234 2228->2198 2232->2210 2233->2234 2238 56953b4-56953c8 2234->2238 2239 5695147-5695363 2234->2239 2237->2212 2245 569549e-56954b2 2238->2245 2246 56953ce-56953de 2238->2246 2623 5695365 2239->2623 2624 5695367 2239->2624 2249 56954b8-5695628 2245->2249 2250 569566f-5695683 2245->2250 2685 56953e4 call 1a905e0 2246->2685 2686 56953e4 call 1a90606 2246->2686 2249->2250 2255 5695689-569579f 2250->2255 2256 56957e6-56957fa 2250->2256 2255->2256 2258 569595d-5695971 2256->2258 2259 5695800-569590b 2256->2259 2266 5695ad4-5695ae8 2258->2266 2267 5695977-5695a82 2258->2267 2559 5695916 2259->2559 2275 5695c4b-5695c5f 2266->2275 2276 5695aee-5695bf9 2266->2276 2565 5695a8d 2267->2565 2270 56953ea-5695450 2351 5695457 2270->2351 2280 5695dc2-5695dd6 2275->2280 2281 5695c65-5695d70 2275->2281 2582 5695c04 2276->2582 2290 5695f39-5695f4d 2280->2290 2291 5695ddc-5695ef2 2280->2291 2586 5695d7b 2281->2586 2298 56960b0-56960c4 2290->2298 2299 5695f53-5696069 2290->2299 2291->2290 2304 56960ca-56961d5 2298->2304 2305 5696227-569623b 2298->2305 2299->2298 2618 56961e0 2304->2618 2314 569639e-56963b2 2305->2314 2315 5696241-569634c 2305->2315 2320 56963b8-56963fd call 5694278 2314->2320 2321 5696536-569654a 2314->2321 2626 5696357 2315->2626 2452 56964bd-56964df 2320->2452 2337 569668d-56966a1 2321->2337 2338 5696550-569656f 2321->2338 2349 56967ee-5696802 2337->2349 2350 56966a7-56967a7 2337->2350 2371 5696614-5696636 2338->2371 2357 5696808-5696908 2349->2357 2358 569694f-5696963 2349->2358 2350->2349 2351->2245 2357->2358 2365 5696969-5696a69 2358->2365 2366 5696ab0-5696ada 2358->2366 2365->2366 2387 5696b9a-5696bae 2366->2387 2388 5696ae0-5696b53 2366->2388 2384 569663c 2371->2384 2385 5696574-5696583 2371->2385 2376->2183 2384->2337 2391 5696589-56965bc 2385->2391 2392 569663e 2385->2392 2401 5696c8b-5696c9f 2387->2401 2402 5696bb4-5696c0b 2387->2402 2388->2387 2481 56965be-56965f8 2391->2481 2482 5696603-569660c 2391->2482 2423 5696643-569668b 2392->2423 2421 5696de5-5696df9 2401->2421 2422 5696ca5-5696d97 2401->2422 2527 5696c12-5696c44 2402->2527 2417->2194 2429 569705c-5697070 2421->2429 2430 5696dff-5696e4f 2421->2430 2657 5696d9e 2422->2657 2423->2337 2443 5697158-569715f 2429->2443 2444 5697076-5697111 call 5694278 * 2 2429->2444 2537 5696ebd-5696ee8 2430->2537 2538 5696e51-5696e77 2430->2538 2444->2443 2470 5696402-5696411 2452->2470 2471 56964e5 2452->2471 2478 56964e7 2470->2478 2479 5696417-5696477 2470->2479 2471->2321 2511 56964ec-5696534 2478->2511 2604 5696481-56964b5 2479->2604 2481->2482 2482->2423 2493 569660e 2482->2493 2493->2371 2511->2321 2527->2401 2621 5696eee-5696fc1 2537->2621 2622 5696fc6-5697057 2537->2622 2616 5696e79-5696e99 2538->2616 2617 5696eb8 2538->2617 2559->2258 2565->2266 2582->2275 2586->2280 2604->2511 2620 56964b7 2604->2620 2616->2617 2617->2429 2618->2305 2620->2452 2621->2429 2622->2429 2627 569536d 2623->2627 2624->2627 2684 5695367 call 5697350 2624->2684 2626->2314 2627->2238 2657->2421 2677->2206 2684->2627 2685->2270 2686->2270
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113496277.0000000005690000.00000040.00000800.00020000.00000000.sdmp, Offset: 05690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5690000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $\Ok$2k
                                    • API String ID: 0-804809350
                                    • Opcode ID: 2effd98f72fe50c37528630e84691f6ed29b991e6f4872bb22082d36d3569e88
                                    • Instruction ID: 6b72f243daf6cf9e3383bc541555c2e9458c5cf1964d4b9bce9f71acf3e4a39f
                                    • Opcode Fuzzy Hash: 2effd98f72fe50c37528630e84691f6ed29b991e6f4872bb22082d36d3569e88
                                    • Instruction Fuzzy Hash: 51033774A01228CFEB25DF74D894BA9B7B2FB48304F1041EAD8096B394DB399E95DF50

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2687 569470f-5694821 2701 569496f-5694983 2687->2701 2702 5694827-569492c 2687->2702 2703 5694985-569498b call 5694210 2701->2703 2704 56949d6-56949ea 2701->2704 2881 5694934 2702->2881 2709 5694990-569499b 2703->2709 2706 56949ec-56949f7 2704->2706 2707 5694a32-5694a46 2704->2707 2706->2707 2710 5694a4c-5694b51 2707->2710 2711 5694b94-5694ba8 2707->2711 2709->2704 2922 5694b59 2710->2922 2713 5694bae-5694bc2 2711->2713 2714 5694cd4-5694ce8 2711->2714 2717 5694bd0-5694be4 2713->2717 2718 5694bc4-5694bcb 2713->2718 2720 5694cee-5694f22 2714->2720 2721 5694f74-5694f88 2714->2721 2722 5694bef-5694c03 2717->2722 2723 5694be6-5694bed 2717->2723 2725 5694c48-5694c5c 2718->2725 3182 5694f2d 2720->3182 2726 5694f8a-5694f91 2721->2726 2727 5694fe2-5694ff6 2721->2727 2728 5694c0e-5694c22 2722->2728 2729 5694c05-5694c0c 2722->2729 2723->2725 2732 5694c5e-5694c74 2725->2732 2733 5694c76-5694c82 2725->2733 2750 5694f9b 2726->2750 2730 5694ff8-5694ffe 2727->2730 2731 5695045-5695059 2727->2731 2737 5694c2d-5694c41 2728->2737 2738 5694c24-5694c2b 2728->2738 2729->2725 2730->2731 2739 569505b 2731->2739 2740 56950a2-56950b6 2731->2740 2742 5694c8d 2732->2742 2733->2742 2737->2725 2745 5694c43-5694c45 2737->2745 2738->2725 2739->2740 2746 56950b8-56950e1 2740->2746 2747 569512d-5695141 2740->2747 2742->2714 2745->2725 2746->2747 2751 56953b4-56953c8 2747->2751 2752 5695147-5695363 2747->2752 2750->2727 2756 569549e-56954b2 2751->2756 2757 56953ce-56953de 2751->2757 3128 5695365 2752->3128 3129 5695367 2752->3129 2760 56954b8-5695628 2756->2760 2761 569566f-5695683 2756->2761 3189 56953e4 call 1a905e0 2757->3189 3190 56953e4 call 1a90606 2757->3190 2760->2761 2764 5695689-569579f 2761->2764 2765 56957e6-56957fa 2761->2765 2764->2765 2769 569595d-5695971 2765->2769 2770 5695800-569590b 2765->2770 2778 5695ad4-5695ae8 2769->2778 2779 5695977-5695a82 2769->2779 3064 5695916 2770->3064 2784 5695c4b-5695c5f 2778->2784 2785 5695aee-5695bf9 2778->2785 3070 5695a8d 2779->3070 2780 56953ea-5695450 2856 5695457 2780->2856 2790 5695dc2-5695dd6 2784->2790 2791 5695c65-5695d70 2784->2791 3087 5695c04 2785->3087 2797 5695f39-5695f4d 2790->2797 2798 5695ddc-5695ef2 2790->2798 3091 5695d7b 2791->3091 2806 56960b0-56960c4 2797->2806 2807 5695f53-5696069 2797->2807 2798->2797 2811 56960ca-56961d5 2806->2811 2812 5696227-569623b 2806->2812 2807->2806 3123 56961e0 2811->3123 2821 569639e-56963b2 2812->2821 2822 5696241-569634c 2812->2822 2827 56963b8-56963fd call 5694278 2821->2827 2828 5696536-569654a 2821->2828 3131 5696357 2822->3131 2957 56964bd-56964df 2827->2957 2843 569668d-56966a1 2828->2843 2844 5696550-569656f 2828->2844 2854 56967ee-5696802 2843->2854 2855 56966a7-56967a7 2843->2855 2876 5696614-5696636 2844->2876 2862 5696808-5696908 2854->2862 2863 569694f-5696963 2854->2863 2855->2854 2856->2756 2862->2863 2870 5696969-5696a69 2863->2870 2871 5696ab0-5696ada 2863->2871 2870->2871 2892 5696b9a-5696bae 2871->2892 2893 5696ae0-5696b53 2871->2893 2889 569663c 2876->2889 2890 5696574-5696583 2876->2890 2881->2701 2889->2843 2896 5696589-56965bc 2890->2896 2897 569663e 2890->2897 2906 5696c8b-5696c9f 2892->2906 2907 5696bb4-5696c0b 2892->2907 2893->2892 2986 56965be-56965f8 2896->2986 2987 5696603-569660c 2896->2987 2928 5696643-569668b 2897->2928 2926 5696de5-5696df9 2906->2926 2927 5696ca5-5696d97 2906->2927 3032 5696c12-5696c44 2907->3032 2922->2711 2934 569705c-5697070 2926->2934 2935 5696dff-5696e4f 2926->2935 3162 5696d9e 2927->3162 2928->2843 2948 5697158-569715f 2934->2948 2949 5697076-5697111 call 5694278 * 2 2934->2949 3042 5696ebd-5696ee8 2935->3042 3043 5696e51-5696e77 2935->3043 2949->2948 2975 5696402-5696411 2957->2975 2976 56964e5 2957->2976 2983 56964e7 2975->2983 2984 5696417-5696477 2975->2984 2976->2828 3016 56964ec-5696534 2983->3016 3109 5696481-56964b5 2984->3109 2986->2987 2987->2928 2998 569660e 2987->2998 2998->2876 3016->2828 3032->2906 3126 5696eee-5696fc1 3042->3126 3127 5696fc6-5697057 3042->3127 3121 5696e79-5696e99 3043->3121 3122 5696eb8 3043->3122 3064->2769 3070->2778 3087->2784 3091->2790 3109->3016 3125 56964b7 3109->3125 3121->3122 3122->2934 3123->2812 3125->2957 3126->2934 3127->2934 3132 569536d 3128->3132 3129->3132 3191 5695367 call 5697350 3129->3191 3131->2821 3132->2751 3162->2926 3182->2721 3189->2780 3190->2780 3191->3132
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113496277.0000000005690000.00000040.00000800.00020000.00000000.sdmp, Offset: 05690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5690000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $\Ok$2k
                                    • API String ID: 0-804809350
                                    • Opcode ID: c34f4154300773154ad9adfb2af077c4e6b6d11d7159603f2125e0d4eff5a075
                                    • Instruction ID: affc9af972a8649a03be2f17fa6fd58a1b134646d58094079d526a8e0903d2dc
                                    • Opcode Fuzzy Hash: c34f4154300773154ad9adfb2af077c4e6b6d11d7159603f2125e0d4eff5a075
                                    • Instruction Fuzzy Hash: CBF23874A01228CFEB25DF74D894BA9B7B2FB48304F1041EAD8096B394DB399E95DF50

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 3690 5694936-5694983 3697 5694985-569498b call 5694210 3690->3697 3698 56949d6-56949ea 3690->3698 3702 5694990-569499b 3697->3702 3699 56949ec-56949f7 3698->3699 3700 5694a32-5694a46 3698->3700 3699->3700 3703 5694a4c-5694b51 3700->3703 3704 5694b94-5694ba8 3700->3704 3702->3698 3902 5694b59 3703->3902 3705 5694bae-5694bc2 3704->3705 3706 5694cd4-5694ce8 3704->3706 3709 5694bd0-5694be4 3705->3709 3710 5694bc4-5694bcb 3705->3710 3712 5694cee-5694f22 3706->3712 3713 5694f74-5694f88 3706->3713 3714 5694bef-5694c03 3709->3714 3715 5694be6-5694bed 3709->3715 3716 5694c48-5694c5c 3710->3716 4162 5694f2d 3712->4162 3717 5694f8a-5694f91 3713->3717 3718 5694fe2-5694ff6 3713->3718 3719 5694c0e-5694c22 3714->3719 3720 5694c05-5694c0c 3714->3720 3715->3716 3723 5694c5e-5694c74 3716->3723 3724 5694c76-5694c82 3716->3724 3740 5694f9b 3717->3740 3721 5694ff8-5694ffe 3718->3721 3722 5695045-5695059 3718->3722 3728 5694c2d-5694c41 3719->3728 3729 5694c24-5694c2b 3719->3729 3720->3716 3721->3722 3730 569505b 3722->3730 3731 56950a2-56950b6 3722->3731 3732 5694c8d 3723->3732 3724->3732 3728->3716 3735 5694c43-5694c45 3728->3735 3729->3716 3730->3731 3736 56950b8-56950e1 3731->3736 3737 569512d-5695141 3731->3737 3732->3706 3735->3716 3736->3737 3741 56953b4-56953c8 3737->3741 3742 5695147-5695363 3737->3742 3740->3718 3745 569549e-56954b2 3741->3745 3746 56953ce-56953de 3741->3746 4108 5695365 3742->4108 4109 5695367 3742->4109 3749 56954b8-5695628 3745->3749 3750 569566f-5695683 3745->3750 4170 56953e4 call 1a905e0 3746->4170 4171 56953e4 call 1a90606 3746->4171 3749->3750 3752 5695689-569579f 3750->3752 3753 56957e6-56957fa 3750->3753 3752->3753 3757 569595d-5695971 3753->3757 3758 5695800-569590b 3753->3758 3765 5695ad4-5695ae8 3757->3765 3766 5695977-5695a82 3757->3766 4044 5695916 3758->4044 3770 5695c4b-5695c5f 3765->3770 3771 5695aee-5695bf9 3765->3771 4050 5695a8d 3766->4050 3767 56953ea-5695450 3838 5695457 3767->3838 3776 5695dc2-5695dd6 3770->3776 3777 5695c65-5695d70 3770->3777 4067 5695c04 3771->4067 3782 5695f39-5695f4d 3776->3782 3783 5695ddc-5695ef2 3776->3783 4071 5695d7b 3777->4071 3788 56960b0-56960c4 3782->3788 3789 5695f53-5696069 3782->3789 3783->3782 3795 56960ca-56961d5 3788->3795 3796 5696227-569623b 3788->3796 3789->3788 4103 56961e0 3795->4103 3805 569639e-56963b2 3796->3805 3806 5696241-569634c 3796->3806 3810 56963b8-56963fd call 5694278 3805->3810 3811 5696536-569654a 3805->3811 4111 5696357 3806->4111 3937 56964bd-56964df 3810->3937 3826 569668d-56966a1 3811->3826 3827 5696550-569656f 3811->3827 3836 56967ee-5696802 3826->3836 3837 56966a7-56967a7 3826->3837 3857 5696614-5696636 3827->3857 3843 5696808-5696908 3836->3843 3844 569694f-5696963 3836->3844 3837->3836 3838->3745 3843->3844 3851 5696969-5696a69 3844->3851 3852 5696ab0-5696ada 3844->3852 3851->3852 3872 5696b9a-5696bae 3852->3872 3873 5696ae0-5696b53 3852->3873 3869 569663c 3857->3869 3870 5696574-5696583 3857->3870 3869->3826 3876 5696589-56965bc 3870->3876 3877 569663e 3870->3877 3886 5696c8b-5696c9f 3872->3886 3887 5696bb4-5696c0b 3872->3887 3873->3872 3966 56965be-56965f8 3876->3966 3967 5696603-569660c 3876->3967 3908 5696643-569668b 3877->3908 3906 5696de5-5696df9 3886->3906 3907 5696ca5-5696d97 3886->3907 4012 5696c12-5696c44 3887->4012 3902->3704 3914 569705c-5697070 3906->3914 3915 5696dff-5696e4f 3906->3915 4142 5696d9e 3907->4142 3908->3826 3928 5697158-569715f 3914->3928 3929 5697076-5697111 call 5694278 * 2 3914->3929 4022 5696ebd-5696ee8 3915->4022 4023 5696e51-5696e77 3915->4023 3929->3928 3955 5696402-5696411 3937->3955 3956 56964e5 3937->3956 3963 56964e7 3955->3963 3964 5696417-5696477 3955->3964 3956->3811 3996 56964ec-5696534 3963->3996 4089 5696481-56964b5 3964->4089 3966->3967 3967->3908 3978 569660e 3967->3978 3978->3857 3996->3811 4012->3886 4106 5696eee-5696fc1 4022->4106 4107 5696fc6-5697057 4022->4107 4101 5696e79-5696e99 4023->4101 4102 5696eb8 4023->4102 4044->3757 4050->3765 4067->3770 4071->3776 4089->3996 4105 56964b7 4089->4105 4101->4102 4102->3914 4103->3796 4105->3937 4106->3914 4107->3914 4112 569536d 4108->4112 4109->4112 4169 5695367 call 5697350 4109->4169 4111->3805 4112->3741 4142->3906 4162->3713 4169->4112 4170->3767 4171->3767
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113496277.0000000005690000.00000040.00000800.00020000.00000000.sdmp, Offset: 05690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5690000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $\Ok$2k
                                    • API String ID: 0-804809350
                                    • Opcode ID: e6fc978e729bf9fceba37ef6b5c845a960ea964de8505accd99dc3ac91d788da
                                    • Instruction ID: 32a9bd69a58c612561d9028d52fb6a1c62d961dbd414e121d62340cf48db7433
                                    • Opcode Fuzzy Hash: e6fc978e729bf9fceba37ef6b5c845a960ea964de8505accd99dc3ac91d788da
                                    • Instruction Fuzzy Hash: 6DF23874A01228CFEB25DF34D894BA9B7B2FB48304F1041EAD84A67394DB399E95DF50

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 5123 5694b5b-5694ba8 5130 5694bae-5694bc2 5123->5130 5131 5694cd4-5694ce8 5123->5131 5132 5694bd0-5694be4 5130->5132 5133 5694bc4-5694bcb 5130->5133 5134 5694cee-5694f22 5131->5134 5135 5694f74-5694f88 5131->5135 5136 5694bef-5694c03 5132->5136 5137 5694be6-5694bed 5132->5137 5138 5694c48-5694c5c 5133->5138 5571 5694f2d 5134->5571 5139 5694f8a-5694f91 5135->5139 5140 5694fe2-5694ff6 5135->5140 5141 5694c0e-5694c22 5136->5141 5142 5694c05-5694c0c 5136->5142 5137->5138 5145 5694c5e-5694c74 5138->5145 5146 5694c76-5694c82 5138->5146 5160 5694f9b 5139->5160 5143 5694ff8-5694ffe 5140->5143 5144 5695045-5695059 5140->5144 5149 5694c2d-5694c41 5141->5149 5150 5694c24-5694c2b 5141->5150 5142->5138 5143->5144 5151 569505b 5144->5151 5152 56950a2-56950b6 5144->5152 5153 5694c8d 5145->5153 5146->5153 5149->5138 5156 5694c43-5694c45 5149->5156 5150->5138 5151->5152 5157 56950b8-56950e1 5152->5157 5158 569512d-5695141 5152->5158 5153->5131 5156->5138 5157->5158 5161 56953b4-56953c8 5158->5161 5162 5695147-5695363 5158->5162 5160->5140 5164 569549e-56954b2 5161->5164 5165 56953ce-56953de 5161->5165 5517 5695365 5162->5517 5518 5695367 5162->5518 5168 56954b8-5695628 5164->5168 5169 569566f-5695683 5164->5169 5579 56953e4 call 1a905e0 5165->5579 5580 56953e4 call 1a90606 5165->5580 5168->5169 5170 5695689-569579f 5169->5170 5171 56957e6-56957fa 5169->5171 5170->5171 5175 569595d-5695971 5171->5175 5176 5695800-569590b 5171->5176 5182 5695ad4-5695ae8 5175->5182 5183 5695977-5695a82 5175->5183 5453 5695916 5176->5453 5187 5695c4b-5695c5f 5182->5187 5188 5695aee-5695bf9 5182->5188 5459 5695a8d 5183->5459 5184 56953ea-5695450 5251 5695457 5184->5251 5192 5695dc2-5695dd6 5187->5192 5193 5695c65-5695d70 5187->5193 5476 5695c04 5188->5476 5198 5695f39-5695f4d 5192->5198 5199 5695ddc-5695ef2 5192->5199 5480 5695d7b 5193->5480 5204 56960b0-56960c4 5198->5204 5205 5695f53-5696069 5198->5205 5199->5198 5209 56960ca-56961d5 5204->5209 5210 5696227-569623b 5204->5210 5205->5204 5512 56961e0 5209->5512 5218 569639e-56963b2 5210->5218 5219 5696241-569634c 5210->5219 5224 56963b8-56963fd call 5694278 5218->5224 5225 5696536-569654a 5218->5225 5520 5696357 5219->5520 5346 56964bd-56964df 5224->5346 5239 569668d-56966a1 5225->5239 5240 5696550-569656f 5225->5240 5249 56967ee-5696802 5239->5249 5250 56966a7-56967a7 5239->5250 5269 5696614-5696636 5240->5269 5255 5696808-5696908 5249->5255 5256 569694f-5696963 5249->5256 5250->5249 5251->5164 5255->5256 5263 5696969-5696a69 5256->5263 5264 5696ab0-5696ada 5256->5264 5263->5264 5283 5696b9a-5696bae 5264->5283 5284 5696ae0-5696b53 5264->5284 5280 569663c 5269->5280 5281 5696574-5696583 5269->5281 5280->5239 5287 5696589-56965bc 5281->5287 5288 569663e 5281->5288 5296 5696c8b-5696c9f 5283->5296 5297 5696bb4-5696c0b 5283->5297 5284->5283 5375 56965be-56965f8 5287->5375 5376 5696603-569660c 5287->5376 5317 5696643-569668b 5288->5317 5315 5696de5-5696df9 5296->5315 5316 5696ca5-5696d97 5296->5316 5421 5696c12-5696c44 5297->5421 5323 569705c-5697070 5315->5323 5324 5696dff-5696e4f 5315->5324 5551 5696d9e 5316->5551 5317->5239 5337 5697158-569715f 5323->5337 5338 5697076-5697111 call 5694278 * 2 5323->5338 5431 5696ebd-5696ee8 5324->5431 5432 5696e51-5696e77 5324->5432 5338->5337 5364 5696402-5696411 5346->5364 5365 56964e5 5346->5365 5372 56964e7 5364->5372 5373 5696417-5696477 5364->5373 5365->5225 5405 56964ec-5696534 5372->5405 5498 5696481-56964b5 5373->5498 5375->5376 5376->5317 5387 569660e 5376->5387 5387->5269 5405->5225 5421->5296 5515 5696eee-5696fc1 5431->5515 5516 5696fc6-5697057 5431->5516 5510 5696e79-5696e99 5432->5510 5511 5696eb8 5432->5511 5453->5175 5459->5182 5476->5187 5480->5192 5498->5405 5514 56964b7 5498->5514 5510->5511 5511->5323 5512->5210 5514->5346 5515->5323 5516->5323 5521 569536d 5517->5521 5518->5521 5578 5695367 call 5697350 5518->5578 5520->5218 5521->5161 5551->5315 5571->5135 5578->5521 5579->5184 5580->5184
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113496277.0000000005690000.00000040.00000800.00020000.00000000.sdmp, Offset: 05690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5690000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $\Ok$2k
                                    • API String ID: 0-804809350
                                    • Opcode ID: ce0aaf6707fb8993280eb1151be2b8aa3c43e05b26f363075d389f1215f32988
                                    • Instruction ID: 87bb64151b7cd98378a54b97033d750f56b782e673ea512828b8ab49eb71f226
                                    • Opcode Fuzzy Hash: ce0aaf6707fb8993280eb1151be2b8aa3c43e05b26f363075d389f1215f32988
                                    • Instruction Fuzzy Hash: 2CE24874A01228CFEB25DF34D894BA9B7B2FB48304F1041EAD84A67394DB399E95DF50

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 6085 5694f2f-5694f88 6092 5694f8a-5694f91 6085->6092 6093 5694fe2-5694ff6 6085->6093 6102 5694f9b 6092->6102 6094 5694ff8-5694ffe 6093->6094 6095 5695045-5695059 6093->6095 6094->6095 6097 569505b 6095->6097 6098 56950a2-56950b6 6095->6098 6097->6098 6100 56950b8-56950e1 6098->6100 6101 569512d-5695141 6098->6101 6100->6101 6103 56953b4-56953c8 6101->6103 6104 5695147-5695363 6101->6104 6102->6093 6105 569549e-56954b2 6103->6105 6106 56953ce-56953de 6103->6106 6440 5695365 6104->6440 6441 5695367 6104->6441 6109 56954b8-5695628 6105->6109 6110 569566f-5695683 6105->6110 6491 56953e4 call 1a905e0 6106->6491 6492 56953e4 call 1a90606 6106->6492 6109->6110 6111 5695689-569579f 6110->6111 6112 56957e6-56957fa 6110->6112 6111->6112 6115 569595d-5695971 6112->6115 6116 5695800-569590b 6112->6116 6121 5695ad4-5695ae8 6115->6121 6122 5695977-5695a82 6115->6122 6377 5695916 6116->6377 6126 5695c4b-5695c5f 6121->6126 6127 5695aee-5695bf9 6121->6127 6385 5695a8d 6122->6385 6123 56953ea-5695450 6186 5695457 6123->6186 6131 5695dc2-5695dd6 6126->6131 6132 5695c65-5695d70 6126->6132 6397 5695c04 6127->6397 6136 5695f39-5695f4d 6131->6136 6137 5695ddc-5695ef2 6131->6137 6406 5695d7b 6132->6406 6142 56960b0-56960c4 6136->6142 6143 5695f53-5696069 6136->6143 6137->6136 6146 56960ca-56961d5 6142->6146 6147 5696227-569623b 6142->6147 6143->6142 6437 56961e0 6146->6437 6158 569639e-56963b2 6147->6158 6159 5696241-569634c 6147->6159 6160 56963b8-56963fd call 5694278 6158->6160 6161 5696536-569654a 6158->6161 6443 5696357 6159->6443 6277 56964bd-56964df 6160->6277 6174 569668d-56966a1 6161->6174 6175 5696550-569656f 6161->6175 6184 56967ee-5696802 6174->6184 6185 56966a7-56967a7 6174->6185 6203 5696614-5696636 6175->6203 6189 5696808-5696908 6184->6189 6190 569694f-5696963 6184->6190 6185->6184 6186->6105 6189->6190 6197 5696969-5696a69 6190->6197 6198 5696ab0-5696ada 6190->6198 6197->6198 6216 5696b9a-5696bae 6198->6216 6217 5696ae0-5696b53 6198->6217 6213 569663c 6203->6213 6214 5696574-5696583 6203->6214 6213->6174 6220 5696589-56965bc 6214->6220 6221 569663e 6214->6221 6229 5696c8b-5696c9f 6216->6229 6230 5696bb4-5696c0b 6216->6230 6217->6216 6305 56965be-56965f8 6220->6305 6306 5696603-569660c 6220->6306 6249 5696643-569668b 6221->6249 6247 5696de5-5696df9 6229->6247 6248 5696ca5-5696d97 6229->6248 6353 5696c12-5696c44 6230->6353 6254 569705c-5697070 6247->6254 6255 5696dff-5696e4f 6247->6255 6470 5696d9e 6248->6470 6249->6174 6268 5697158-569715f 6254->6268 6269 5697076-5697111 call 5694278 * 2 6254->6269 6359 5696ebd-5696ee8 6255->6359 6360 5696e51-5696e77 6255->6360 6269->6268 6294 5696402-5696411 6277->6294 6295 56964e5 6277->6295 6302 56964e7 6294->6302 6303 5696417-5696477 6294->6303 6295->6161 6332 56964ec-5696534 6302->6332 6421 5696481-56964b5 6303->6421 6305->6306 6306->6249 6322 569660e 6306->6322 6322->6203 6332->6161 6353->6229 6438 5696eee-5696fc1 6359->6438 6439 5696fc6-5697057 6359->6439 6434 5696e79-5696e99 6360->6434 6435 5696eb8 6360->6435 6377->6115 6385->6121 6397->6126 6406->6131 6421->6332 6436 56964b7 6421->6436 6434->6435 6435->6254 6436->6277 6437->6147 6438->6254 6439->6254 6444 569536d 6440->6444 6441->6444 6490 5695367 call 5697350 6441->6490 6443->6158 6444->6103 6470->6247 6490->6444 6491->6123 6492->6123
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113496277.0000000005690000.00000040.00000800.00020000.00000000.sdmp, Offset: 05690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5690000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \Ok$2k
                                    • API String ID: 0-3697909212
                                    • Opcode ID: 520f310a31e72cee0ed6ba36cb83d26ac8044c8bd512971fa6402e49493d227c
                                    • Instruction ID: 2b1ec96330480cbf925aeff67088edcc131d98503c026f706120bfce1d92a63c
                                    • Opcode Fuzzy Hash: 520f310a31e72cee0ed6ba36cb83d26ac8044c8bd512971fa6402e49493d227c
                                    • Instruction Fuzzy Hash: 7ED23974A01228CFEB25DF34D894BA9B7B2FB48304F1041EAD849A7394DB399E95DF50

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 6897 5695000-5695059 6904 569505b 6897->6904 6905 56950a2-56950b6 6897->6905 6904->6905 6906 56950b8-56950e1 6905->6906 6907 569512d-5695141 6905->6907 6906->6907 6908 56953b4-56953c8 6907->6908 6909 5695147-5695363 6907->6909 6910 569549e-56954b2 6908->6910 6911 56953ce-56953de 6908->6911 7245 5695365 6909->7245 7246 5695367 6909->7246 6914 56954b8-5695628 6910->6914 6915 569566f-5695683 6910->6915 7296 56953e4 call 1a905e0 6911->7296 7297 56953e4 call 1a90606 6911->7297 6914->6915 6916 5695689-569579f 6915->6916 6917 56957e6-56957fa 6915->6917 6916->6917 6920 569595d-5695971 6917->6920 6921 5695800-569590b 6917->6921 6926 5695ad4-5695ae8 6920->6926 6927 5695977-5695a82 6920->6927 7182 5695916 6921->7182 6931 5695c4b-5695c5f 6926->6931 6932 5695aee-5695bf9 6926->6932 7190 5695a8d 6927->7190 6928 56953ea-5695450 6991 5695457 6928->6991 6936 5695dc2-5695dd6 6931->6936 6937 5695c65-5695d70 6931->6937 7202 5695c04 6932->7202 6941 5695f39-5695f4d 6936->6941 6942 5695ddc-5695ef2 6936->6942 7211 5695d7b 6937->7211 6947 56960b0-56960c4 6941->6947 6948 5695f53-5696069 6941->6948 6942->6941 6951 56960ca-56961d5 6947->6951 6952 5696227-569623b 6947->6952 6948->6947 7242 56961e0 6951->7242 6963 569639e-56963b2 6952->6963 6964 5696241-569634c 6952->6964 6965 56963b8-56963fd call 5694278 6963->6965 6966 5696536-569654a 6963->6966 7248 5696357 6964->7248 7082 56964bd-56964df 6965->7082 6979 569668d-56966a1 6966->6979 6980 5696550-569656f 6966->6980 6989 56967ee-5696802 6979->6989 6990 56966a7-56967a7 6979->6990 7008 5696614-5696636 6980->7008 6994 5696808-5696908 6989->6994 6995 569694f-5696963 6989->6995 6990->6989 6991->6910 6994->6995 7002 5696969-5696a69 6995->7002 7003 5696ab0-5696ada 6995->7003 7002->7003 7021 5696b9a-5696bae 7003->7021 7022 5696ae0-5696b53 7003->7022 7018 569663c 7008->7018 7019 5696574-5696583 7008->7019 7018->6979 7025 5696589-56965bc 7019->7025 7026 569663e 7019->7026 7034 5696c8b-5696c9f 7021->7034 7035 5696bb4-5696c0b 7021->7035 7022->7021 7110 56965be-56965f8 7025->7110 7111 5696603-569660c 7025->7111 7054 5696643-569668b 7026->7054 7052 5696de5-5696df9 7034->7052 7053 5696ca5-5696d97 7034->7053 7158 5696c12-5696c44 7035->7158 7059 569705c-5697070 7052->7059 7060 5696dff-5696e4f 7052->7060 7275 5696d9e 7053->7275 7054->6979 7073 5697158-569715f 7059->7073 7074 5697076-5697111 call 5694278 * 2 7059->7074 7164 5696ebd-5696ee8 7060->7164 7165 5696e51-5696e77 7060->7165 7074->7073 7099 5696402-5696411 7082->7099 7100 56964e5 7082->7100 7107 56964e7 7099->7107 7108 5696417-5696477 7099->7108 7100->6966 7137 56964ec-5696534 7107->7137 7226 5696481-56964b5 7108->7226 7110->7111 7111->7054 7127 569660e 7111->7127 7127->7008 7137->6966 7158->7034 7243 5696eee-5696fc1 7164->7243 7244 5696fc6-5697057 7164->7244 7239 5696e79-5696e99 7165->7239 7240 5696eb8 7165->7240 7182->6920 7190->6926 7202->6931 7211->6936 7226->7137 7241 56964b7 7226->7241 7239->7240 7240->7059 7241->7082 7242->6952 7243->7059 7244->7059 7249 569536d 7245->7249 7246->7249 7295 5695367 call 5697350 7246->7295 7248->6963 7249->6908 7275->7052 7295->7249 7296->6928 7297->6928
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113496277.0000000005690000.00000040.00000800.00020000.00000000.sdmp, Offset: 05690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5690000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \Ok$2k
                                    • API String ID: 0-3697909212
                                    • Opcode ID: cafde2e314848e60af1dac29c966f58d359b73d0212632da9d3ab12530098ce7
                                    • Instruction ID: fa99ae6c17ef3615c06e1bc6a7cc11d572b2ae31909d35426420c285740406d3
                                    • Opcode Fuzzy Hash: cafde2e314848e60af1dac29c966f58d359b73d0212632da9d3ab12530098ce7
                                    • Instruction Fuzzy Hash: 80D23874A01228CFEB25DF34D894BA9B7B2FB48304F1041EAD849A7394DB399E95DF50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113496277.0000000005690000.00000040.00000800.00020000.00000000.sdmp, Offset: 05690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5690000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \Ok$2k
                                    • API String ID: 0-3697909212
                                    • Opcode ID: 971bd6112c392691846f5835a263afc5ebeeb74d030e144a713331ca95cceb4c
                                    • Instruction ID: ad17a8b7035c7f6c4d80ece28c7ce03daa6ce421ec147d91050fba677b682821
                                    • Opcode Fuzzy Hash: 971bd6112c392691846f5835a263afc5ebeeb74d030e144a713331ca95cceb4c
                                    • Instruction Fuzzy Hash: A8D23874A01228CFEB25DF34D894BA9B7B2FB48304F1041EAD849A7394DB399E95DF50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113496277.0000000005690000.00000040.00000800.00020000.00000000.sdmp, Offset: 05690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5690000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \Ok$2k
                                    • API String ID: 0-3697909212
                                    • Opcode ID: 0a92291fdbc96f53e02b2c3b0fb30acfed87082bd66cb135854eb632f0077bf3
                                    • Instruction ID: 6b148baec607401f68a16618c4dce95c30bf4569610cd25683080ce4882d1595
                                    • Opcode Fuzzy Hash: 0a92291fdbc96f53e02b2c3b0fb30acfed87082bd66cb135854eb632f0077bf3
                                    • Instruction Fuzzy Hash: C7D23874A01228CFEB25DF34D894BA9B7B2FB48304F1041EAD849A7394DB399E95DF50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113496277.0000000005690000.00000040.00000800.00020000.00000000.sdmp, Offset: 05690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5690000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \Ok$2k
                                    • API String ID: 0-3697909212
                                    • Opcode ID: b15f21c5b1e733c0931840a0edc9149abc215823173685b2c1a6133b162f84a2
                                    • Instruction ID: 73c541477f4bdf46683ab2f52023f788047c75ba323d22d1e2a6a9dbd046b54c
                                    • Opcode Fuzzy Hash: b15f21c5b1e733c0931840a0edc9149abc215823173685b2c1a6133b162f84a2
                                    • Instruction Fuzzy Hash: 82C22874A01228CFEB25DF70D894BA9B7B6FB48304F1041E9D90A6B394DB399E95CF50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113496277.0000000005690000.00000040.00000800.00020000.00000000.sdmp, Offset: 05690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5690000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \Ok
                                    • API String ID: 0-3677890257
                                    • Opcode ID: c11807033c9155a0400ef623ad34934034b84a0bfb070d91a79c3d95bdd47b72
                                    • Instruction ID: 7d799525ad730abd6bedb00a10415c325edda652b6cc6d94b6eda5270370b6d4
                                    • Opcode Fuzzy Hash: c11807033c9155a0400ef623ad34934034b84a0bfb070d91a79c3d95bdd47b72
                                    • Instruction Fuzzy Hash: 1AC22974A01228CFEB25DF70D894BA9B7B6FB48304F1041E9D90A6B394DB399E95CF50
                                    APIs
                                    • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 0157BC97
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4111385655.000000000157A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0157A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_157a000_server.jbxd
                                    Similarity
                                    • API ID: AdjustPrivilegesToken
                                    • String ID:
                                    • API String ID: 2874748243-0
                                    • Opcode ID: b3aa0a7fd21f9ff214510d4e22d031d7e45337110aa771b35369b18db9101672
                                    • Instruction ID: 41bc432f71e2aafcb19decaa70e93a04ca4a8e8542b1b976d172e77f6d308882
                                    • Opcode Fuzzy Hash: b3aa0a7fd21f9ff214510d4e22d031d7e45337110aa771b35369b18db9101672
                                    • Instruction Fuzzy Hash: 3821DE765097809FEB238F25DC45B52BFF8EF06310F0884DAE9858F163D275A908DB62
                                    APIs
                                    • NtQuerySystemInformation.NTDLL ref: 0157BE05
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4111385655.000000000157A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0157A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_157a000_server.jbxd
                                    Similarity
                                    • API ID: InformationQuerySystem
                                    • String ID:
                                    • API String ID: 3562636166-0
                                    • Opcode ID: 5e3f16dfef39cc959a54ea8862cf128ac36208503b2ce1dee68da0e86f0f49ab
                                    • Instruction ID: 3cf05e99c81d9f73748b34ed58f84125cef463a4c7c9c583f5ae20eb93611f96
                                    • Opcode Fuzzy Hash: 5e3f16dfef39cc959a54ea8862cf128ac36208503b2ce1dee68da0e86f0f49ab
                                    • Instruction Fuzzy Hash: 1B1190724097C09FDB228F24DC45A52FFB4EF06324F0984DAED844F663D275A908DB62
                                    APIs
                                    • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 0157BC97
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4111385655.000000000157A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0157A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_157a000_server.jbxd
                                    Similarity
                                    • API ID: AdjustPrivilegesToken
                                    • String ID:
                                    • API String ID: 2874748243-0
                                    • Opcode ID: 19a54a41e92ce631f5d68c93d7ec6282547320e09b8baa9fa0f285aa6fde4295
                                    • Instruction ID: 1190969979f9b59b33351361a2f5cc2cf702ea203a2ad9e6a3a376815a29a1d0
                                    • Opcode Fuzzy Hash: 19a54a41e92ce631f5d68c93d7ec6282547320e09b8baa9fa0f285aa6fde4295
                                    • Instruction Fuzzy Hash: 5511A3355006049FEB20CF19E945B56FBE8FF08210F08C8AADD468F652D735E454DB61
                                    APIs
                                    • NtQuerySystemInformation.NTDLL ref: 0157BE05
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4111385655.000000000157A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0157A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_157a000_server.jbxd
                                    Similarity
                                    • API ID: InformationQuerySystem
                                    • String ID:
                                    • API String ID: 3562636166-0
                                    • Opcode ID: c241c4a66a209044fe5b2eb8420f0e60ba6a64d3069bfd9f5e5b8b3faa6531ce
                                    • Instruction ID: be4cece4719bf246149072047ca4ae7644f1905cdcf61687976ef7f6e6d0485d
                                    • Opcode Fuzzy Hash: c241c4a66a209044fe5b2eb8420f0e60ba6a64d3069bfd9f5e5b8b3faa6531ce
                                    • Instruction Fuzzy Hash: E1018F324006449FDB218F19E945B65FBE0FF08220F08C8AADE450F752D376A858CFA2
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113496277.0000000005690000.00000040.00000800.00020000.00000000.sdmp, Offset: 05690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5690000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6ede7ece9276653cec950bb5aa06e4d83d4904985a74dfc6715a1d74c4a8915d
                                    • Instruction ID: 0cd0ed45c1a717bec36ca98f080d9b3882c0936dff5b32687fc4a36ae0095f43
                                    • Opcode Fuzzy Hash: 6ede7ece9276653cec950bb5aa06e4d83d4904985a74dfc6715a1d74c4a8915d
                                    • Instruction Fuzzy Hash: 22021872A11222DBDF2DCB30D45047DB3AAFF826513164176D895AB794EF2EEC42CB90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 5618 5690118-5690169 5623 5690174-569017a 5618->5623 5624 5690181-56901bd 5623->5624 5629 56901c8-56901d5 5624->5629 5632 56901d5 call 5693b18 5629->5632 5633 56901d5 call 5693fc8 5629->5633 5634 56901d5 call 5693dcc 5629->5634 5635 56901d5 call 569414f 5629->5635 5636 56901d5 call 56939bf 5629->5636 5637 56901d5 call 5693d01 5629->5637 5638 56901d5 call 56937e1 5629->5638 5639 56901d5 call 1a905e0 5629->5639 5640 56901d5 call 5693804 5629->5640 5641 56901d5 call 5693c66 5629->5641 5642 56901d5 call 1a90606 5629->5642 5631 56901db-56901de 5632->5631 5633->5631 5634->5631 5635->5631 5636->5631 5637->5631 5638->5631 5639->5631 5640->5631 5641->5631 5642->5631
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113496277.0000000005690000.00000040.00000800.00020000.00000000.sdmp, Offset: 05690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5690000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 2k$2k$5])k^$E])k^
                                    • API String ID: 0-1196077540
                                    • Opcode ID: cfe44258e6fa86c7e523650bbcdf521e76dfbb67c6476b7cfc1a625395d47716
                                    • Instruction ID: ed58bc3649d072345d247e0efb3004d4e853dd7d20cc4c7c2ca7a565ab5d1f51
                                    • Opcode Fuzzy Hash: cfe44258e6fa86c7e523650bbcdf521e76dfbb67c6476b7cfc1a625395d47716
                                    • Instruction Fuzzy Hash: C811C6356042418FD315A779B0126AD3BA7ABC329872458AED041DF355CFAE4C4AC7B2
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113496277.0000000005690000.00000040.00000800.00020000.00000000.sdmp, Offset: 05690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5690000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \Ok$2k
                                    • API String ID: 0-3697909212
                                    • Opcode ID: 95bc4fc151d8a341809d8f10cfc358226a91dcc2ed8caa4f43a305254352d3ce
                                    • Instruction ID: f27dd1f99ee2fad05d24a3e0f293322b16b649445a2a3d97b80db8b7234b46f5
                                    • Opcode Fuzzy Hash: 95bc4fc151d8a341809d8f10cfc358226a91dcc2ed8caa4f43a305254352d3ce
                                    • Instruction Fuzzy Hash: 87222730A00218CFDB28DF74D955BADB7B2FB49308F1045AAD40AAB394DB799E95CF50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113496277.0000000005690000.00000040.00000800.00020000.00000000.sdmp, Offset: 05690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5690000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \Ok$2k
                                    • API String ID: 0-3697909212
                                    • Opcode ID: 1d7f494a2f7f4d60d2340c1463b83a0d3073a301f5533f5a1276e168d963d80e
                                    • Instruction ID: 69b1b5eaa7fbd6aeced2f45b02e2c0f21bf73769cc32cc4b654edfa766d8437d
                                    • Opcode Fuzzy Hash: 1d7f494a2f7f4d60d2340c1463b83a0d3073a301f5533f5a1276e168d963d80e
                                    • Instruction Fuzzy Hash: CDC15830A00219CFDB28DBB4D855BADB7B2FB85304F1045AAD40AAB394DB795D85CF91
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113496277.0000000005690000.00000040.00000800.00020000.00000000.sdmp, Offset: 05690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5690000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \Ok
                                    • API String ID: 0-3677890257
                                    • Opcode ID: de432ca8150ad75b865bd28d768981b5d5c12966ee3f8f3d377d4503ca677f9f
                                    • Instruction ID: 2287607ab0d955a6bc0018379b82894f1361298ebc8836bc6cb64fada7ce03a3
                                    • Opcode Fuzzy Hash: de432ca8150ad75b865bd28d768981b5d5c12966ee3f8f3d377d4503ca677f9f
                                    • Instruction Fuzzy Hash: 02B22874A01228CFEB29DF70D994BA9B7B6FB48304F1041E9D8096B394DB399E95CF50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113496277.0000000005690000.00000040.00000800.00020000.00000000.sdmp, Offset: 05690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5690000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \Ok
                                    • API String ID: 0-3677890257
                                    • Opcode ID: 132915515005642fafff392672f85154ed5f006f4e995581b12e68b4ef658815
                                    • Instruction ID: 0e974a0f76ebf5d532555075fa22a64ee6e486be0a33f044455fd070adde1e47
                                    • Opcode Fuzzy Hash: 132915515005642fafff392672f85154ed5f006f4e995581b12e68b4ef658815
                                    • Instruction Fuzzy Hash: 13921874A01228CFEB29DF70D994BA9B7B6FB48304F1041E9D9096B394DB399E91CF50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113496277.0000000005690000.00000040.00000800.00020000.00000000.sdmp, Offset: 05690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5690000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \Ok
                                    • API String ID: 0-3677890257
                                    • Opcode ID: a4045cff8dd3dd02ed141d620c2833270eba2e794fddbb93bb432627ccb7cc63
                                    • Instruction ID: 95ef10fce8daeff7b5c72b03f6b680341cba44a0ccab1ae7393aea2949b0b632
                                    • Opcode Fuzzy Hash: a4045cff8dd3dd02ed141d620c2833270eba2e794fddbb93bb432627ccb7cc63
                                    • Instruction Fuzzy Hash: 34822B74A01228CFEB29DF34D994BA9B7B6FB48304F1041E9D9096B394DB399E91CF50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113496277.0000000005690000.00000040.00000800.00020000.00000000.sdmp, Offset: 05690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5690000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \Ok
                                    • API String ID: 0-3677890257
                                    • Opcode ID: 8f04669fe79d841cefa3e41187773239271d3a5471115026537c4c2d0bf357e5
                                    • Instruction ID: 3ffaa66ee381bb85e01c57c0dd608752b7803dbf7aee4568c73f5cfe32d337fa
                                    • Opcode Fuzzy Hash: 8f04669fe79d841cefa3e41187773239271d3a5471115026537c4c2d0bf357e5
                                    • Instruction Fuzzy Hash: 29722C74A01228CFEB29DF34D994BA9B7B6FB48304F1041E9D909A7394DB399E91CF50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113496277.0000000005690000.00000040.00000800.00020000.00000000.sdmp, Offset: 05690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5690000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \Ok
                                    • API String ID: 0-3677890257
                                    • Opcode ID: 167b9baca2ad3314777b5c6d5ca777ed466ee3082aaf6f3b8430a294fb28fa2c
                                    • Instruction ID: adfdffa7a7f8330894dc29a2aba42a548426f20e6017991a4603cc34c1acdf9c
                                    • Opcode Fuzzy Hash: 167b9baca2ad3314777b5c6d5ca777ed466ee3082aaf6f3b8430a294fb28fa2c
                                    • Instruction Fuzzy Hash: FD521A74A01228CFDB29DF34D994BA9B7B6FB49304F1041E9D909AB394DB399E91CF40
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113496277.0000000005690000.00000040.00000800.00020000.00000000.sdmp, Offset: 05690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5690000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \Ok
                                    • API String ID: 0-3677890257
                                    • Opcode ID: 352efc2e3189f4073096f952de2eae174c3e67a4273d672050a5a70c2a39704a
                                    • Instruction ID: 87ea84c52a7d579ae9b149fafe44c883dc3adcc8b0496ea9d901f3ed265559c4
                                    • Opcode Fuzzy Hash: 352efc2e3189f4073096f952de2eae174c3e67a4273d672050a5a70c2a39704a
                                    • Instruction Fuzzy Hash: 16320A74A01228CFDB29DF34D994BA9B7B6FB49305F1041EAD909A7394DB399E91CF00
                                    APIs
                                    • RegOpenKeyExW.KERNELBASE(?,00000E24), ref: 0157B1F5
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4111385655.000000000157A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0157A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_157a000_server.jbxd
                                    Similarity
                                    • API ID: Open
                                    • String ID:
                                    • API String ID: 71445658-0
                                    • Opcode ID: cb8f546d4524314aa1cf46429a12816e7c79bd940c9e3ab391f2fa5dc1b6d47a
                                    • Instruction ID: 8b7d9c738251a563f6c0446e9645023cf301c74c1d1418d2a696bf78ea2ade1c
                                    • Opcode Fuzzy Hash: cb8f546d4524314aa1cf46429a12816e7c79bd940c9e3ab391f2fa5dc1b6d47a
                                    • Instruction Fuzzy Hash: 3F3190725097806FE7238B649C55FA6BFB8EF17210F0985DBE980CB5A3D224A90DC771
                                    APIs
                                    • RegCreateKeyExW.KERNELBASE(?,00000E24), ref: 058000CD
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113616956.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5800000_server.jbxd
                                    Similarity
                                    • API ID: Create
                                    • String ID:
                                    • API String ID: 2289755597-0
                                    • Opcode ID: 704d5682698ba1d5963687e611010d56403cc6e6b5cd70d2921d3f38e9572b85
                                    • Instruction ID: 9535c54c77ea66480d26425239813883ebacc84d7deeac6a5c4f14ac49fc19a3
                                    • Opcode Fuzzy Hash: 704d5682698ba1d5963687e611010d56403cc6e6b5cd70d2921d3f38e9572b85
                                    • Instruction Fuzzy Hash: 4A31C372504344AFE7228B25DC44FA7BBFCEF05214F08859AF985CB652E364E848CB71
                                    APIs
                                    • RegQueryValueExW.KERNELBASE(?,00000E24,?,?), ref: 058016DA
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113616956.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5800000_server.jbxd
                                    Similarity
                                    • API ID: QueryValue
                                    • String ID:
                                    • API String ID: 3660427363-0
                                    • Opcode ID: 4c65e401c7149adf3162f86c1b1ea55302b4df449490565e671869200305962d
                                    • Instruction ID: be839b47d12671cdbb71f19a26a521dbd9d5d802b2366325a5837a7c07de93a9
                                    • Opcode Fuzzy Hash: 4c65e401c7149adf3162f86c1b1ea55302b4df449490565e671869200305962d
                                    • Instruction Fuzzy Hash: 4E318B7510E3C06FD3138B258C65A61BFB4EF47610F0E45CBE8848F6A3D229A909D7B2
                                    APIs
                                    • getaddrinfo.WS2_32(?,00000E24), ref: 05802307
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113616956.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5800000_server.jbxd
                                    Similarity
                                    • API ID: getaddrinfo
                                    • String ID:
                                    • API String ID: 300660673-0
                                    • Opcode ID: be27a21b4ba17c499f733c3a9b2f084510331868316c3975ec6f5e4baf4fca74
                                    • Instruction ID: 05baa90da0d7bf2a2d0b1005dbec7b0d20690276a8a556787b4280c6e75b3003
                                    • Opcode Fuzzy Hash: be27a21b4ba17c499f733c3a9b2f084510331868316c3975ec6f5e4baf4fca74
                                    • Instruction Fuzzy Hash: CC31C2B2504340AFE721CB64DC84FA6FBACEF15314F04489AFA499B691D374E949CB71
                                    APIs
                                    • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 0157AB25
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4111385655.000000000157A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0157A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_157a000_server.jbxd
                                    Similarity
                                    • API ID: CreateFile
                                    • String ID:
                                    • API String ID: 823142352-0
                                    • Opcode ID: 5af1df22646270fb3f9e8edb73c01c990f7b9eb84121766a9fe9f026c3652db5
                                    • Instruction ID: 2c37c106a2971771b62166df6ffcfdad151ec2cb81b1aa796201ecd5ae8b917b
                                    • Opcode Fuzzy Hash: 5af1df22646270fb3f9e8edb73c01c990f7b9eb84121766a9fe9f026c3652db5
                                    • Instruction Fuzzy Hash: EB31A071504340AFE722CF25DC85F66BFF8EF05210F08889AE9898B652D375E808CB71
                                    APIs
                                    • GetProcessTimes.KERNELBASE(?,00000E24,4FFD7EB5,00000000,00000000,00000000,00000000), ref: 058021D5
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113616956.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5800000_server.jbxd
                                    Similarity
                                    • API ID: ProcessTimes
                                    • String ID:
                                    • API String ID: 1995159646-0
                                    • Opcode ID: 44ab9573b2eefc11a50319d23739ea6745aef524a08118f1256054fe8f96e49c
                                    • Instruction ID: ed9e2a1ee337cc1dca6360e1ac25569e47b5ccc291413f2ee307fc259a1953b3
                                    • Opcode Fuzzy Hash: 44ab9573b2eefc11a50319d23739ea6745aef524a08118f1256054fe8f96e49c
                                    • Instruction Fuzzy Hash: F631E8725057806FE722CF54DC45FA6BFB8EF06310F08849AE985CB193D2359909C771
                                    APIs
                                    • CreateMutexW.KERNELBASE(?,?), ref: 0157B01D
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4111385655.000000000157A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0157A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_157a000_server.jbxd
                                    Similarity
                                    • API ID: CreateMutex
                                    • String ID:
                                    • API String ID: 1964310414-0
                                    • Opcode ID: 383bc60ce1f2c7704cf1145a11e5069ec0d6cb0d75636f1807dfa331521ed8ad
                                    • Instruction ID: 5785436a84c0932ef4e1fdac5d3fff8b126e9f204f9e3e056a42f3035bf94962
                                    • Opcode Fuzzy Hash: 383bc60ce1f2c7704cf1145a11e5069ec0d6cb0d75636f1807dfa331521ed8ad
                                    • Instruction Fuzzy Hash: E231B3B15097806FE722CB29DD85B96BFF8EF06214F08849AE944CF293D375A908C771
                                    APIs
                                    • RegQueryValueExW.KERNELBASE(?,00000E24,4FFD7EB5,00000000,00000000,00000000,00000000), ref: 0157B2F8
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4111385655.000000000157A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0157A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_157a000_server.jbxd
                                    Similarity
                                    • API ID: QueryValue
                                    • String ID:
                                    • API String ID: 3660427363-0
                                    • Opcode ID: f6ae6e704a1950e22b3c3fbc93647942af796e9178ce8fffcabe35ba2af6e197
                                    • Instruction ID: 240d21911c23342341f302d306a34e4723200fba7a518af43de0435644539439
                                    • Opcode Fuzzy Hash: f6ae6e704a1950e22b3c3fbc93647942af796e9178ce8fffcabe35ba2af6e197
                                    • Instruction Fuzzy Hash: DB31D1751053806FE722CF25DC45FA6BFBCEF06210F08849AE9458B253D264E948CB71
                                    APIs
                                    • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32(?,00000E24), ref: 05801BC3
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113616956.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5800000_server.jbxd
                                    Similarity
                                    • API ID: DescriptorSecurity$ConvertString
                                    • String ID:
                                    • API String ID: 3907675253-0
                                    • Opcode ID: fc71143d93284b9e16124c0609be4074f05a44b6ca6d3d76635db8615752560c
                                    • Instruction ID: 3193a21460f69689af67ebb6a7c6343ee6dda2b17952331ef42b0ad7e8611dd6
                                    • Opcode Fuzzy Hash: fc71143d93284b9e16124c0609be4074f05a44b6ca6d3d76635db8615752560c
                                    • Instruction Fuzzy Hash: 2D318172604384AFE7218F64DC45FA7BFB8EF45220F0884AAE945DB652D374E948CB71
                                    APIs
                                    • GetExitCodeProcess.KERNELBASE(?,00000E24,4FFD7EB5,00000000,00000000,00000000,00000000), ref: 05800738
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113616956.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5800000_server.jbxd
                                    Similarity
                                    • API ID: CodeExitProcess
                                    • String ID:
                                    • API String ID: 3861947596-0
                                    • Opcode ID: a3ee378b6164b5656e5ab109d474d705819649cc27f0d1f3f688c38c0de78184
                                    • Instruction ID: 6f4ba8f7fb6b4abdf40bfc763012754c3c4a311f055ad43e44588cd4bd43fd1f
                                    • Opcode Fuzzy Hash: a3ee378b6164b5656e5ab109d474d705819649cc27f0d1f3f688c38c0de78184
                                    • Instruction Fuzzy Hash: 5221D6725097805FE7128B64DC45FA6BFB8EF46324F0884DAE944CF193D2749909CB71
                                    APIs
                                    • RegCreateKeyExW.KERNELBASE(?,00000E24), ref: 058000CD
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113616956.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5800000_server.jbxd
                                    Similarity
                                    • API ID: Create
                                    • String ID:
                                    • API String ID: 2289755597-0
                                    • Opcode ID: 61c3d61a926aca7903c186a1e9c9aa0aebad3feda5aee29abb6424475ffe219c
                                    • Instruction ID: f01b259ce4fba76dd9b6c119ab63cd1ec888a0d4b65edf14834ba1f63cdc2ba2
                                    • Opcode Fuzzy Hash: 61c3d61a926aca7903c186a1e9c9aa0aebad3feda5aee29abb6424475ffe219c
                                    • Instruction Fuzzy Hash: 41219E72600604EFE731DE29DC44FA7BBECEF08214F04892AED46C6691E734E9488A71
                                    APIs
                                    • OleGetClipboard.OLE32(?,00000E24,?,?), ref: 0157A77E
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4111385655.000000000157A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0157A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_157a000_server.jbxd
                                    Similarity
                                    • API ID: Clipboard
                                    • String ID:
                                    • API String ID: 220874293-0
                                    • Opcode ID: ba347c7a0af9962b3a0ae1b36f0513962f3d8fec14ea57e443a9e059b0c3ff0e
                                    • Instruction ID: ad18894597d5dacbac81732e7bdb56174afba308837439fabe0e54905d2896ca
                                    • Opcode Fuzzy Hash: ba347c7a0af9962b3a0ae1b36f0513962f3d8fec14ea57e443a9e059b0c3ff0e
                                    • Instruction Fuzzy Hash: 0731807544D3C06FD3138B259C61B61BFB4EF87610F0A40DBE884CB6A3D2296919D7B2
                                    APIs
                                    • RegSetValueExW.KERNELBASE(?,00000E24,4FFD7EB5,00000000,00000000,00000000,00000000), ref: 058001C4
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113616956.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5800000_server.jbxd
                                    Similarity
                                    • API ID: Value
                                    • String ID:
                                    • API String ID: 3702945584-0
                                    • Opcode ID: 8c9e7b1693115a7e488586b5828afd713809d553d60f7e77721eb16232a8cab9
                                    • Instruction ID: fc6e20c24668024f74400a88ccb44ffb68756d35b7cd1c4f6811354e1a998ade
                                    • Opcode Fuzzy Hash: 8c9e7b1693115a7e488586b5828afd713809d553d60f7e77721eb16232a8cab9
                                    • Instruction Fuzzy Hash: 9F319872409780AFE7228F55DC55B56FFB8EF06310F0844DAE9858F6A2D274A948C761
                                    APIs
                                    • GetProcessWorkingSetSize.KERNEL32(?,00000E24,4FFD7EB5,00000000,00000000,00000000,00000000), ref: 058032C3
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113616956.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5800000_server.jbxd
                                    Similarity
                                    • API ID: ProcessSizeWorking
                                    • String ID:
                                    • API String ID: 3584180929-0
                                    • Opcode ID: b31f3da810ab4a77bd9f49f3f5cea062c52fb83987e2b96a3040a44509d150e7
                                    • Instruction ID: 428b73bccb84224f1d5ccebecd4ed6c7f573cc272980ab2292b57a22a7ef7105
                                    • Opcode Fuzzy Hash: b31f3da810ab4a77bd9f49f3f5cea062c52fb83987e2b96a3040a44509d150e7
                                    • Instruction Fuzzy Hash: 3721E6725097806FE713CB24DC55B96BFA8EF46214F0888DBE984CF193D6349908C771
                                    APIs
                                    • getaddrinfo.WS2_32(?,00000E24), ref: 05802307
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113616956.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5800000_server.jbxd
                                    Similarity
                                    • API ID: getaddrinfo
                                    • String ID:
                                    • API String ID: 300660673-0
                                    • Opcode ID: ab6dab44a1938fd0d1af78a530f1e11fc4b53cb5e8eb7d72fa7eadb6441f25c2
                                    • Instruction ID: 96fb88a983fe9ecf32a8df3c6b119b63e96de307bf083074abdb7866a51d6228
                                    • Opcode Fuzzy Hash: ab6dab44a1938fd0d1af78a530f1e11fc4b53cb5e8eb7d72fa7eadb6441f25c2
                                    • Instruction Fuzzy Hash: F821E471500204AEE730DB54CC84FA6F7ACEB14314F04485AFE49DA681D7B5E9488B71
                                    APIs
                                    • SendMessageTimeoutA.USER32(?,00000E24), ref: 0157B4D5
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4111385655.000000000157A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0157A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_157a000_server.jbxd
                                    Similarity
                                    • API ID: MessageSendTimeout
                                    • String ID:
                                    • API String ID: 1599653421-0
                                    • Opcode ID: f147d416223649cbcec6540b5aaabb4a5079922f7f9c4726e8fbbcfd708827bf
                                    • Instruction ID: d436358bf7abf73b22525e5d76035b84ea1098aacb09e4c23fc1d9381cef7c02
                                    • Opcode Fuzzy Hash: f147d416223649cbcec6540b5aaabb4a5079922f7f9c4726e8fbbcfd708827bf
                                    • Instruction Fuzzy Hash: 1921E471104740AFE7228F64DC45FA6FFB8EF46310F08889AF9848F662D375A508CB61
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113616956.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5800000_server.jbxd
                                    Similarity
                                    • API ID: select
                                    • String ID:
                                    • API String ID: 1274211008-0
                                    • Opcode ID: 06e4bcc1ded143a4f8d81ecac8deb70034dc02164fcd42a5c7d508541df922d0
                                    • Instruction ID: e0b0d83281c60ef1e41e06cb72808fe79c78e92f3198dc3f4f0a8cdab0cb7e89
                                    • Opcode Fuzzy Hash: 06e4bcc1ded143a4f8d81ecac8deb70034dc02164fcd42a5c7d508541df922d0
                                    • Instruction Fuzzy Hash: D9217E715097849FDB22CF25DC44B62BFF8EF0A210F0988DAED85CB162D234A909CB61
                                    APIs
                                    • RegSetValueExW.KERNELBASE(?,00000E24,4FFD7EB5,00000000,00000000,00000000,00000000), ref: 0157B3E4
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4111385655.000000000157A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0157A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_157a000_server.jbxd
                                    Similarity
                                    • API ID: Value
                                    • String ID:
                                    • API String ID: 3702945584-0
                                    • Opcode ID: d01ad1793c6f63a664a4a1075c51466273ae9fac8e144cd76e0388bcd906a23a
                                    • Instruction ID: 13083870b68ec9592afeebc089fd1738de0aac2d2309d95fca83ed557675a612
                                    • Opcode Fuzzy Hash: d01ad1793c6f63a664a4a1075c51466273ae9fac8e144cd76e0388bcd906a23a
                                    • Instruction Fuzzy Hash: 7321A1725047806FE7228F55DC45FA7BFBCEF46210F08859AE9858B292D374E848C7B1
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113616956.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5800000_server.jbxd
                                    Similarity
                                    • API ID: FileView
                                    • String ID:
                                    • API String ID: 3314676101-0
                                    • Opcode ID: 7a1712300f902814c1fb677c5964632dffb1834c010f473173ffb27763a56120
                                    • Instruction ID: 544e9e53976fce4cbdb7e16ffe9a7d64baa53bc03f97ecdcb6fb1e1859a7e388
                                    • Opcode Fuzzy Hash: 7a1712300f902814c1fb677c5964632dffb1834c010f473173ffb27763a56120
                                    • Instruction Fuzzy Hash: 2F21B471404740AFE722CB19DD45F96FFF8EF09224F04899EE9858B652D375A908CBA1
                                    APIs
                                    • WSASocketW.WS2_32(?,?,?,?,?), ref: 05801792
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113616956.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5800000_server.jbxd
                                    Similarity
                                    • API ID: Socket
                                    • String ID:
                                    • API String ID: 38366605-0
                                    • Opcode ID: 2794109a602850edc370338ff68eeb168d839f5a4825fc32414b7595bedff09c
                                    • Instruction ID: 9e155ff436a1383825c66267a7335a2f2e515dd5d3533b13e304d67e254e7d8e
                                    • Opcode Fuzzy Hash: 2794109a602850edc370338ff68eeb168d839f5a4825fc32414b7595bedff09c
                                    • Instruction Fuzzy Hash: C7219171405740AFE721CF55DD45F66FFF8EF05220F08889AE9858B692D375A908CB61
                                    APIs
                                    • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 0157AB25
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4111385655.000000000157A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0157A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_157a000_server.jbxd
                                    Similarity
                                    • API ID: CreateFile
                                    • String ID:
                                    • API String ID: 823142352-0
                                    • Opcode ID: 8916de9324b553872ff2540d7fc022b138dcb3fed44f6cebc48941a3c810c66b
                                    • Instruction ID: 40b2fbaea9f72779a8743dbdaf8f7415e978a6f6094008bf04457ea8fc5a79ac
                                    • Opcode Fuzzy Hash: 8916de9324b553872ff2540d7fc022b138dcb3fed44f6cebc48941a3c810c66b
                                    • Instruction Fuzzy Hash: 07219271500700AFE721CF69DD85F6AFBE8FF08210F08896AEA498B652D375E508CB71
                                    APIs
                                    • RegQueryValueExW.KERNELBASE(?,00000E24,4FFD7EB5,00000000,00000000,00000000,00000000), ref: 05801AD8
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113616956.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5800000_server.jbxd
                                    Similarity
                                    • API ID: QueryValue
                                    • String ID:
                                    • API String ID: 3660427363-0
                                    • Opcode ID: 9762e1c67efaa9263ca87f21cb122fdce2c70478611588e1d34d0c0ce1c6e673
                                    • Instruction ID: 019602f6283eb6e3c10f638404fd813a394191a627a0651d210af8a10d40ba3d
                                    • Opcode Fuzzy Hash: 9762e1c67efaa9263ca87f21cb122fdce2c70478611588e1d34d0c0ce1c6e673
                                    • Instruction Fuzzy Hash: 00219F72504780AFE722CB55DC48F67BFF8EF45720F08859AE9459B692D324E908CB61
                                    APIs
                                    • K32EnumProcesses.KERNEL32(?,?,?,4FFD7EB5,00000000,?,?,?,?,?,?,?,?,6C823C58), ref: 058008CA
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113616956.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5800000_server.jbxd
                                    Similarity
                                    • API ID: EnumProcesses
                                    • String ID:
                                    • API String ID: 84517404-0
                                    • Opcode ID: 9716a3772fc1cdc43cc976c626650037f82ffdd06b21a8d790a5fc0c169ba171
                                    • Instruction ID: 7a610af741f561e2e2125545c41a8db926a230b53f7a99865147635695e2dc44
                                    • Opcode Fuzzy Hash: 9716a3772fc1cdc43cc976c626650037f82ffdd06b21a8d790a5fc0c169ba171
                                    • Instruction Fuzzy Hash: 8D219C7150D7C09FEB128B75DC59A92BFB8AF47210F0D84DBE984CF1A3D2249908CB62
                                    APIs
                                    • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32(?,00000E24), ref: 05801BC3
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113616956.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5800000_server.jbxd
                                    Similarity
                                    • API ID: DescriptorSecurity$ConvertString
                                    • String ID:
                                    • API String ID: 3907675253-0
                                    • Opcode ID: 0411194f76575f7c2fe768d2436dfb14b04d361ec0e10b9bb47a0b913432be77
                                    • Instruction ID: 08a61cc95b2e6750f93f5fad1fb0618b09d329de4e210422c0713af927759648
                                    • Opcode Fuzzy Hash: 0411194f76575f7c2fe768d2436dfb14b04d361ec0e10b9bb47a0b913432be77
                                    • Instruction Fuzzy Hash: E5219572600204AFE720DE69DD45F6AFBACEF44324F04846AED45DB681D774E948CAB1
                                    APIs
                                    • RegOpenKeyExW.KERNELBASE(?,00000E24), ref: 0157B1F5
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4111385655.000000000157A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0157A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_157a000_server.jbxd
                                    Similarity
                                    • API ID: Open
                                    • String ID:
                                    • API String ID: 71445658-0
                                    • Opcode ID: 8413a2a46805ba2d0c616078746deac9c8e51d7e3f6f19e5dd5b037fa79f0c19
                                    • Instruction ID: 996b042d6f40162827b3c35ad342bede9a9a5dd9b6f2d2e0dbc1071ce1548e35
                                    • Opcode Fuzzy Hash: 8413a2a46805ba2d0c616078746deac9c8e51d7e3f6f19e5dd5b037fa79f0c19
                                    • Instruction Fuzzy Hash: DD21D472500704AEE7319F59EC45FABFBECEF14214F04896AEA05CB641D734E9088AB1
                                    APIs
                                    • ReadFile.KERNELBASE(?,00000E24,4FFD7EB5,00000000,00000000,00000000,00000000), ref: 0157AE4D
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4111385655.000000000157A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0157A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_157a000_server.jbxd
                                    Similarity
                                    • API ID: FileRead
                                    • String ID:
                                    • API String ID: 2738559852-0
                                    • Opcode ID: ff43acf276dfdde062c6c38a28b61d2adc97fe6a24615bd7072845a09880f6e5
                                    • Instruction ID: 39b58080c13faf6b7826cd9b1d02d0c9c21669d6113fb60ce848e10f0c325b5d
                                    • Opcode Fuzzy Hash: ff43acf276dfdde062c6c38a28b61d2adc97fe6a24615bd7072845a09880f6e5
                                    • Instruction Fuzzy Hash: C621D472404340AFE7228F55DC44FA7BFACEF45310F08885AF9448B652D234A908CBB1
                                    APIs
                                    • GetFileType.KERNELBASE(?,00000E24,4FFD7EB5,00000000,00000000,00000000,00000000), ref: 0157ACBD
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4111385655.000000000157A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0157A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_157a000_server.jbxd
                                    Similarity
                                    • API ID: FileType
                                    • String ID:
                                    • API String ID: 3081899298-0
                                    • Opcode ID: 6f4beb2edc03b1a63f60a29e50eb95837a5e45559ee33f779c30ac1ae18a0e70
                                    • Instruction ID: e9897037be7232c0ded89fca921b771d51b0d3f3eaa874c0d31f8d1550baf80d
                                    • Opcode Fuzzy Hash: 6f4beb2edc03b1a63f60a29e50eb95837a5e45559ee33f779c30ac1ae18a0e70
                                    • Instruction Fuzzy Hash: 2921D8B54087806FE7128B15DC45BA6BFBCEF46314F0884D6F9848F253D274A909D771
                                    APIs
                                    • SetErrorMode.KERNELBASE(?), ref: 0157AA44
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4111385655.000000000157A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0157A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_157a000_server.jbxd
                                    Similarity
                                    • API ID: ErrorMode
                                    • String ID:
                                    • API String ID: 2340568224-0
                                    • Opcode ID: d0388442d23b9dcb5b10f434a8037f0fb801319bd792262f73a503ab694f9471
                                    • Instruction ID: 023c6990e67f93d0b747f8e1d034de55b7ad524cb315ba101551fb3d3b1d13df
                                    • Opcode Fuzzy Hash: d0388442d23b9dcb5b10f434a8037f0fb801319bd792262f73a503ab694f9471
                                    • Instruction Fuzzy Hash: 8721897540E7C09FD7138B259C65A51BFB4EF53620F0E80DBD8848F6A3D2685808CB72
                                    APIs
                                    • SetProcessWorkingSetSize.KERNEL32(?,00000E24,4FFD7EB5,00000000,00000000,00000000,00000000), ref: 058033A7
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113616956.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5800000_server.jbxd
                                    Similarity
                                    • API ID: ProcessSizeWorking
                                    • String ID:
                                    • API String ID: 3584180929-0
                                    • Opcode ID: 9f231355175d9e35205708282b88af452048fc2e568c0a2c0ee704eda7ea2a95
                                    • Instruction ID: b6f77f7138afed9d8bc737a3aaa165fd77b88d4faaf7651112e8a997891e0d3b
                                    • Opcode Fuzzy Hash: 9f231355175d9e35205708282b88af452048fc2e568c0a2c0ee704eda7ea2a95
                                    • Instruction Fuzzy Hash: 6321D7715043806FD722CB25DC45FA7BFACEF45210F0888AAF945CB292D374A908CBB1
                                    APIs
                                    • CreateMutexW.KERNELBASE(?,?), ref: 0157B01D
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4111385655.000000000157A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0157A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_157a000_server.jbxd
                                    Similarity
                                    • API ID: CreateMutex
                                    • String ID:
                                    • API String ID: 1964310414-0
                                    • Opcode ID: 306f1c2c3f2a4542be5c01dda6397417ff59540d8003c535968affc672877a6e
                                    • Instruction ID: f73c4f4d6163e62602de1c927491cfcb3b3f64cfbf954ccec9a5d69cf2ae9400
                                    • Opcode Fuzzy Hash: 306f1c2c3f2a4542be5c01dda6397417ff59540d8003c535968affc672877a6e
                                    • Instruction Fuzzy Hash: CC2180715002449FE721DF29ED86BAAFBE8EF04214F088869E945CF642D775E908CAB1
                                    APIs
                                    • shutdown.WS2_32(?,00000E24,4FFD7EB5,00000000,00000000,00000000,00000000), ref: 05801FFC
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113616956.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5800000_server.jbxd
                                    Similarity
                                    • API ID: shutdown
                                    • String ID:
                                    • API String ID: 2510479042-0
                                    • Opcode ID: ca5db6a9970fa11b5ac9e36f80d4a6cbdc41659492d989f4b8eaa0ef05feb6d5
                                    • Instruction ID: 3896998204c15414fec15c42429d5cdf40bf3bd4830d1253063e381e873969c8
                                    • Opcode Fuzzy Hash: ca5db6a9970fa11b5ac9e36f80d4a6cbdc41659492d989f4b8eaa0ef05feb6d5
                                    • Instruction Fuzzy Hash: 6C21C5714093806FD7228B15DC45F56BFB8EF46210F0885DBE945DF292D378A948C771
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4111385655.000000000157A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0157A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_157a000_server.jbxd
                                    Similarity
                                    • API ID: send
                                    • String ID:
                                    • API String ID: 2809346765-0
                                    • Opcode ID: ca12f510303b6ba9520662827dfb7b93b60682fcc25645b3c6189ac210d1e91b
                                    • Instruction ID: dc1e7714fa3fab4cb45de6d1d8c2d5cd8247b4bf83e51d520717b9fd03d2a132
                                    • Opcode Fuzzy Hash: ca12f510303b6ba9520662827dfb7b93b60682fcc25645b3c6189ac210d1e91b
                                    • Instruction Fuzzy Hash: C921CC7240D7C09FD7238B209C55A52BFB4EF07210F0D84DBD9848F5A3D279A809CB62
                                    APIs
                                    • RegQueryValueExW.KERNELBASE(?,00000E24,4FFD7EB5,00000000,00000000,00000000,00000000), ref: 0157B2F8
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4111385655.000000000157A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0157A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_157a000_server.jbxd
                                    Similarity
                                    • API ID: QueryValue
                                    • String ID:
                                    • API String ID: 3660427363-0
                                    • Opcode ID: cad124298c93e6acdb8689d097bc4b7ef9f269b577a5787cdefd2a697fe2ef99
                                    • Instruction ID: d82e3d1d0a3943468d93feaddba8ff184c12d76b6471b4e05ee8e23b27038145
                                    • Opcode Fuzzy Hash: cad124298c93e6acdb8689d097bc4b7ef9f269b577a5787cdefd2a697fe2ef99
                                    • Instruction Fuzzy Hash: B421A175600604AFE721CE19EC46FAABBECEF04610F04856AED058B651D774E848CAB1
                                    APIs
                                    • CopyFileW.KERNELBASE(?,?,?), ref: 0157B78E
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4111385655.000000000157A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0157A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_157a000_server.jbxd
                                    Similarity
                                    • API ID: CopyFile
                                    • String ID:
                                    • API String ID: 1304948518-0
                                    • Opcode ID: 885b7c6c65a085291547b432861a79354d97206d84b0c05403a925854783343d
                                    • Instruction ID: 1a4525f1153699309af9cd84fab31fb0b9a7d6dcb9459724bcefb9ecb3c26ea3
                                    • Opcode Fuzzy Hash: 885b7c6c65a085291547b432861a79354d97206d84b0c05403a925854783343d
                                    • Instruction Fuzzy Hash: 552181725083809FEB228F29DC55B56FFE8EF46210F0884DAED85CF252D235E804CB61
                                    APIs
                                    • ioctlsocket.WS2_32(?,00000E24,4FFD7EB5,00000000,00000000,00000000,00000000), ref: 05803113
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113616956.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5800000_server.jbxd
                                    Similarity
                                    • API ID: ioctlsocket
                                    • String ID:
                                    • API String ID: 3577187118-0
                                    • Opcode ID: 43fe05e4afe9871ed48d10f56a870e17940a3c526f0ae8142b21b15afea190df
                                    • Instruction ID: a9583cfaec51b95b625832021618954b1fed936c2c76ff0af72e1a4b5f9b1569
                                    • Opcode Fuzzy Hash: 43fe05e4afe9871ed48d10f56a870e17940a3c526f0ae8142b21b15afea190df
                                    • Instruction Fuzzy Hash: 1421C372509380AFD722CF54DC44FA6BFB8EF45210F0888AAF9449F292D374A908C7B1
                                    APIs
                                    • DeleteFileW.KERNELBASE(?), ref: 0157B908
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4111385655.000000000157A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0157A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_157a000_server.jbxd
                                    Similarity
                                    • API ID: DeleteFile
                                    • String ID:
                                    • API String ID: 4033686569-0
                                    • Opcode ID: 9da38e59689d01c52145d332f89b39a43a3f215900356873601325f9c588df19
                                    • Instruction ID: 2fd3f76e1177095e8b4b030f62680290ca3534eb42ba99d3599671427c3535a6
                                    • Opcode Fuzzy Hash: 9da38e59689d01c52145d332f89b39a43a3f215900356873601325f9c588df19
                                    • Instruction Fuzzy Hash: F521C3B25093809FD712CB25DC45B52BFB8EF06214F0984DAED85CF293D2749908CB62
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113616956.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5800000_server.jbxd
                                    Similarity
                                    • API ID: FileView
                                    • String ID:
                                    • API String ID: 3314676101-0
                                    • Opcode ID: 6bb1770b3016c72edd584e27f156e40dd7665697a71ec3579d6ef35ecb1508d8
                                    • Instruction ID: 8e1b12b2d0fa1d5a338909635a161634a0100da10541d815f1ca420538e6b618
                                    • Opcode Fuzzy Hash: 6bb1770b3016c72edd584e27f156e40dd7665697a71ec3579d6ef35ecb1508d8
                                    • Instruction Fuzzy Hash: 8021D471500604AFE721CF19DD89FA6FBE8EF08324F048969ED458B681D375E809CBB1
                                    APIs
                                    • WSAConnect.WS2_32(?,?,?,?,?,?,?), ref: 0580248E
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113616956.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5800000_server.jbxd
                                    Similarity
                                    • API ID: Connect
                                    • String ID:
                                    • API String ID: 3144859779-0
                                    • Opcode ID: 86cc2301ffa0b09417c58c5ba9231e076c90d9f188042424d016494920637d04
                                    • Instruction ID: d10cec17fbc3bec642a11428bec003c8428837c35389fce415e7efe38a6414e0
                                    • Opcode Fuzzy Hash: 86cc2301ffa0b09417c58c5ba9231e076c90d9f188042424d016494920637d04
                                    • Instruction Fuzzy Hash: 81219275508780AFDB628F55DC44B62FFF8EF06310F08849AED858B162D379A818DB71
                                    APIs
                                    • WSASocketW.WS2_32(?,?,?,?,?), ref: 05801792
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113616956.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5800000_server.jbxd
                                    Similarity
                                    • API ID: Socket
                                    • String ID:
                                    • API String ID: 38366605-0
                                    • Opcode ID: 824b998a080b78b8bbabd3aee00f1a5f4b28fa95d04bef72bf63ff042cfcd7e2
                                    • Instruction ID: 4e5e2fb5917172f7a9695d021469326fb4c9d078e9ffc15f23461a654fad29b3
                                    • Opcode Fuzzy Hash: 824b998a080b78b8bbabd3aee00f1a5f4b28fa95d04bef72bf63ff042cfcd7e2
                                    • Instruction Fuzzy Hash: 1321F671500604AFE721CF59DD85FA6FBE8EF08324F04886DED458B696D375A808CBB1
                                    APIs
                                    • SendMessageTimeoutA.USER32(?,00000E24), ref: 0157B4D5
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4111385655.000000000157A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0157A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_157a000_server.jbxd
                                    Similarity
                                    • API ID: MessageSendTimeout
                                    • String ID:
                                    • API String ID: 1599653421-0
                                    • Opcode ID: 3ed0835e425aa231ac18f84ab9a88e3b7213a2179d1deb67dcd4a24a0b62a32a
                                    • Instruction ID: 4c5a3aa6a1e17579acbb46807afdefa5cfc5e644892b8bf107312978d507e0d9
                                    • Opcode Fuzzy Hash: 3ed0835e425aa231ac18f84ab9a88e3b7213a2179d1deb67dcd4a24a0b62a32a
                                    • Instruction Fuzzy Hash: 1921D272500704AFEB318F54DD45FA6FBE8EF04710F14886AEE458E651D375A508CBB1
                                    APIs
                                    • LoadLibraryA.KERNELBASE(?,00000E24), ref: 05802757
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113616956.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5800000_server.jbxd
                                    Similarity
                                    • API ID: LibraryLoad
                                    • String ID:
                                    • API String ID: 1029625771-0
                                    • Opcode ID: ef4414156cd2306046a08c2a29ce55a0aff20d6d488a3ea6215df144ba2f38f5
                                    • Instruction ID: 7099e86cd5e1e70a72ec419c6c66daccab9d697771d247906524788420d3cd44
                                    • Opcode Fuzzy Hash: ef4414156cd2306046a08c2a29ce55a0aff20d6d488a3ea6215df144ba2f38f5
                                    • Instruction Fuzzy Hash: 141103755043806FE721CB15DC85FA6FFB8EF45320F08849AFD448F292C2B8A948CBA1
                                    APIs
                                    • SetFileAttributesW.KERNELBASE(?,?), ref: 0157B9BF
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4111385655.000000000157A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0157A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_157a000_server.jbxd
                                    Similarity
                                    • API ID: AttributesFile
                                    • String ID:
                                    • API String ID: 3188754299-0
                                    • Opcode ID: c5797be19023c6c1a68e5dec15622aa96ee9a5cb776b913b1ecd961a4a2b7074
                                    • Instruction ID: b82af6f6ec68918cfc9889a7347c94036e77f0c604c8ee4b564eed1ecb9643b2
                                    • Opcode Fuzzy Hash: c5797be19023c6c1a68e5dec15622aa96ee9a5cb776b913b1ecd961a4a2b7074
                                    • Instruction Fuzzy Hash: 2621D5715093C09FE7128B29DC85B56BFE8EF06220F0984DAE985CF263D2389904CB71
                                    APIs
                                    • RegSetValueExW.KERNELBASE(?,00000E24,4FFD7EB5,00000000,00000000,00000000,00000000), ref: 0157B3E4
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4111385655.000000000157A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0157A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_157a000_server.jbxd
                                    Similarity
                                    • API ID: Value
                                    • String ID:
                                    • API String ID: 3702945584-0
                                    • Opcode ID: 4f341a3ea047f2e47aac815137a0d3e9ea9a77b20e2ac41d1504ef889c17a4ed
                                    • Instruction ID: 0fb353dd8a96c83065242c8cf7fc2b059c8fb0e5d66696e854973d2310fd2c75
                                    • Opcode Fuzzy Hash: 4f341a3ea047f2e47aac815137a0d3e9ea9a77b20e2ac41d1504ef889c17a4ed
                                    • Instruction Fuzzy Hash: CC11B172500704AFE7318E19EC46BA7BBECEF04610F04896AED458A642D374E8488AB1
                                    APIs
                                    • RegQueryValueExW.KERNELBASE(?,00000E24,4FFD7EB5,00000000,00000000,00000000,00000000), ref: 05801AD8
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113616956.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5800000_server.jbxd
                                    Similarity
                                    • API ID: QueryValue
                                    • String ID:
                                    • API String ID: 3660427363-0
                                    • Opcode ID: 028c369bb96480d5612409e43d9f501e45e1b5428e94597ed77c425fea1e748f
                                    • Instruction ID: 63337b3081fd26e1a93bb1ccde3814639da388e3d13ea6f2abff3a6da39fbaf2
                                    • Opcode Fuzzy Hash: 028c369bb96480d5612409e43d9f501e45e1b5428e94597ed77c425fea1e748f
                                    • Instruction Fuzzy Hash: 4111C072600704AFE721CE59CC48FA6B7E8EF04724F04856AED46CA691D774E808CAB1
                                    APIs
                                    • LookupPrivilegeValueW.ADVAPI32(?,?,?), ref: 0157BB16
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4111385655.000000000157A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0157A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_157a000_server.jbxd
                                    Similarity
                                    • API ID: LookupPrivilegeValue
                                    • String ID:
                                    • API String ID: 3899507212-0
                                    • Opcode ID: e24096cbc1e0f4be6a822ee3db280c857edd2ce598870356a72e3f8ac3b0504d
                                    • Instruction ID: 1f1fd388c31d1047ff90b50a5afbbf7dd630157a889fa0c3739d8490659a0ab5
                                    • Opcode Fuzzy Hash: e24096cbc1e0f4be6a822ee3db280c857edd2ce598870356a72e3f8ac3b0504d
                                    • Instruction Fuzzy Hash: 3E1193B26043805FEB21CF29DC45B67BFE8EF45220F0884AAED49DB652D274E904CB71
                                    APIs
                                    • GetProcessTimes.KERNELBASE(?,00000E24,4FFD7EB5,00000000,00000000,00000000,00000000), ref: 058021D5
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113616956.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5800000_server.jbxd
                                    Similarity
                                    • API ID: ProcessTimes
                                    • String ID:
                                    • API String ID: 1995159646-0
                                    • Opcode ID: 88091fd41aa9e599c6d6efb1221cd86b09275451259a0592d1dc1f801b3722cf
                                    • Instruction ID: 77a12bc4706d3331afa4550ee4db46039717a6cee6b3b5cc2e21baf27da1c067
                                    • Opcode Fuzzy Hash: 88091fd41aa9e599c6d6efb1221cd86b09275451259a0592d1dc1f801b3722cf
                                    • Instruction Fuzzy Hash: E9110676500700AFE721CF58DC44FAAFBA8EF04314F04886AED06CB641D375A8088BB1
                                    APIs
                                    • SetProcessWorkingSetSize.KERNEL32(?,00000E24,4FFD7EB5,00000000,00000000,00000000,00000000), ref: 058033A7
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113616956.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5800000_server.jbxd
                                    Similarity
                                    • API ID: ProcessSizeWorking
                                    • String ID:
                                    • API String ID: 3584180929-0
                                    • Opcode ID: dacab87f11770d63ba16202f1ad40b1b86a074b6f57aecb73d5b850d87061bb5
                                    • Instruction ID: 9a4c339fcf04933405f236fa3c2ad910c578b9fd4a97fd79d573f327fcff1b64
                                    • Opcode Fuzzy Hash: dacab87f11770d63ba16202f1ad40b1b86a074b6f57aecb73d5b850d87061bb5
                                    • Instruction Fuzzy Hash: 2F1108715002049FE721CF19DD85FAABBA8EF04224F04886AED45CB681DB75A9088BB1
                                    APIs
                                    • GetProcessWorkingSetSize.KERNEL32(?,00000E24,4FFD7EB5,00000000,00000000,00000000,00000000), ref: 058032C3
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113616956.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5800000_server.jbxd
                                    Similarity
                                    • API ID: ProcessSizeWorking
                                    • String ID:
                                    • API String ID: 3584180929-0
                                    • Opcode ID: dacab87f11770d63ba16202f1ad40b1b86a074b6f57aecb73d5b850d87061bb5
                                    • Instruction ID: d86abbf04b3a28c001223b6b35baa39815ad4b6506e45138811681f250f37ddf
                                    • Opcode Fuzzy Hash: dacab87f11770d63ba16202f1ad40b1b86a074b6f57aecb73d5b850d87061bb5
                                    • Instruction Fuzzy Hash: 7511C871500304AFE721CF59DD85BAABBA8EF44314F04886AED05CB681D775A9088BB5
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0157A5DE
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4111385655.000000000157A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0157A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_157a000_server.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: 48b366a14f37df4aacc7b83f94545c3cd04c78a1881a4597469e379395ae665f
                                    • Instruction ID: 54e425a1d256fa2179602dd1726a3bf12ad7da59fd105c30d4cd1361c4d73a20
                                    • Opcode Fuzzy Hash: 48b366a14f37df4aacc7b83f94545c3cd04c78a1881a4597469e379395ae665f
                                    • Instruction Fuzzy Hash: CD117571409780AFDB228F55DC44A62FFF4EF4A210F08889AED858B552D275A918DB61
                                    APIs
                                    • GetExitCodeProcess.KERNELBASE(?,00000E24,4FFD7EB5,00000000,00000000,00000000,00000000), ref: 05800738
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113616956.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5800000_server.jbxd
                                    Similarity
                                    • API ID: CodeExitProcess
                                    • String ID:
                                    • API String ID: 3861947596-0
                                    • Opcode ID: b42252431533e39575ef71a8bda02e140308712bc9810c48a977fbc4b22b7480
                                    • Instruction ID: 1c888391816dcc6dc10a9ffac6a6f0941d879b966898d43dd9218a1bc1b22233
                                    • Opcode Fuzzy Hash: b42252431533e39575ef71a8bda02e140308712bc9810c48a977fbc4b22b7480
                                    • Instruction Fuzzy Hash: BE11E771600204AFE721CB19DD49FB6B79CDF44224F14846AED45CB682D779A9488AB1
                                    APIs
                                    • RegSetValueExW.KERNELBASE(?,00000E24,4FFD7EB5,00000000,00000000,00000000,00000000), ref: 058001C4
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113616956.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5800000_server.jbxd
                                    Similarity
                                    • API ID: Value
                                    • String ID:
                                    • API String ID: 3702945584-0
                                    • Opcode ID: cd3d8bd99faf5234698e9407a6c731b03811aa728f500e17003f9652dbad6224
                                    • Instruction ID: 0a08fb8fd10c8326229026671f8f7f33f8e5e45ded910f0e31f798c7dd0a585a
                                    • Opcode Fuzzy Hash: cd3d8bd99faf5234698e9407a6c731b03811aa728f500e17003f9652dbad6224
                                    • Instruction Fuzzy Hash: 3911D072500704AFE7319E19DC48FA6FBE8EF04224F04856AED468A691D375E9088AB1
                                    APIs
                                    • ReadFile.KERNELBASE(?,00000E24,4FFD7EB5,00000000,00000000,00000000,00000000), ref: 0157AE4D
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4111385655.000000000157A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0157A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_157a000_server.jbxd
                                    Similarity
                                    • API ID: FileRead
                                    • String ID:
                                    • API String ID: 2738559852-0
                                    • Opcode ID: 00d576b1dee91937e1dee35e0405a0bc25b85ab4f7ea385b50ea72a76c8779f4
                                    • Instruction ID: 23d335ad1c9fcf21d3e830fc355f3dc73b72abab88d15c7af001dc6b5439352e
                                    • Opcode Fuzzy Hash: 00d576b1dee91937e1dee35e0405a0bc25b85ab4f7ea385b50ea72a76c8779f4
                                    • Instruction Fuzzy Hash: 7211B272500700AFEB21CF59ED45BAAFBE8EF44314F08886AED458F651D375A5088BB1
                                    APIs
                                    • ioctlsocket.WS2_32(?,00000E24,4FFD7EB5,00000000,00000000,00000000,00000000), ref: 05803113
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113616956.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5800000_server.jbxd
                                    Similarity
                                    • API ID: ioctlsocket
                                    • String ID:
                                    • API String ID: 3577187118-0
                                    • Opcode ID: 22c10e9b80a24556a2c1fb4592b56514a072e70c9fa17973679a7b40ce985327
                                    • Instruction ID: 88d697f9e2fbf7ec0442795710547aade6d86e375a1d68515e7f0a8ab66472b4
                                    • Opcode Fuzzy Hash: 22c10e9b80a24556a2c1fb4592b56514a072e70c9fa17973679a7b40ce985327
                                    • Instruction Fuzzy Hash: 7E11E372500204AFE721DF58DD44FA6FBA8EF48324F04886AEE05DB681D775A9088AB1
                                    APIs
                                    • shutdown.WS2_32(?,00000E24,4FFD7EB5,00000000,00000000,00000000,00000000), ref: 05801FFC
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113616956.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5800000_server.jbxd
                                    Similarity
                                    • API ID: shutdown
                                    • String ID:
                                    • API String ID: 2510479042-0
                                    • Opcode ID: 471a2398ee3e0bd71b2eeacef07a90d51faf0340fcd24bf389109639ce2c0775
                                    • Instruction ID: e44b40df3dcd8610f6672d5ebda2faeb41e9b8f98ceb86ce3325321c33da4bb7
                                    • Opcode Fuzzy Hash: 471a2398ee3e0bd71b2eeacef07a90d51faf0340fcd24bf389109639ce2c0775
                                    • Instruction Fuzzy Hash: 2C110671500304AFE721CF19DD49FA7BBACEF44324F048866ED06CB681D379A908CAB1
                                    APIs
                                    • LoadLibraryA.KERNELBASE(?,00000E24), ref: 05802757
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113616956.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5800000_server.jbxd
                                    Similarity
                                    • API ID: LibraryLoad
                                    • String ID:
                                    • API String ID: 1029625771-0
                                    • Opcode ID: 5c0ccec39f7cdb043bbd57f315bdc0db076b7631007349d24ca374077aea64c2
                                    • Instruction ID: 52bd042d2f76265094605901264f33083c8a19f193cee86c790624c3d257bd18
                                    • Opcode Fuzzy Hash: 5c0ccec39f7cdb043bbd57f315bdc0db076b7631007349d24ca374077aea64c2
                                    • Instruction Fuzzy Hash: EF11E575500204AEE720DB19DD89FB6FBA8DF04724F148469ED058A781D3B9A948CAA1
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113616956.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5800000_server.jbxd
                                    Similarity
                                    • API ID: select
                                    • String ID:
                                    • API String ID: 1274211008-0
                                    • Opcode ID: 291258cb7da2cfd63bf33e09a8cdee1d97272938febd50be5d52d8f3082be43d
                                    • Instruction ID: 117fcb72ddf36ed7998cc615f563cc60e68335892511f914c5b4af400a21ec4e
                                    • Opcode Fuzzy Hash: 291258cb7da2cfd63bf33e09a8cdee1d97272938febd50be5d52d8f3082be43d
                                    • Instruction Fuzzy Hash: FF116D716042049FDB60CF19DC84B66FBE8EF08210F0888AAED49CB696D735E948CB61
                                    APIs
                                    • CopyFileW.KERNELBASE(?,?,?), ref: 0157B78E
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4111385655.000000000157A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0157A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_157a000_server.jbxd
                                    Similarity
                                    • API ID: CopyFile
                                    • String ID:
                                    • API String ID: 1304948518-0
                                    • Opcode ID: 94e0d933f76090302ed3b244dff3718ab45d94a9c4be65943588d19e700be0d5
                                    • Instruction ID: 4c37bea43717bd1c85edc76bbd065e0038a4acb359b15c26490bdd835719c5d2
                                    • Opcode Fuzzy Hash: 94e0d933f76090302ed3b244dff3718ab45d94a9c4be65943588d19e700be0d5
                                    • Instruction Fuzzy Hash: C0118272A002009FEB60CF29E886756FBE8EF04210F0C846ADD45CF646D235E404CB61
                                    APIs
                                    • LookupPrivilegeValueW.ADVAPI32(?,?,?), ref: 0157BB16
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4111385655.000000000157A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0157A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_157a000_server.jbxd
                                    Similarity
                                    • API ID: LookupPrivilegeValue
                                    • String ID:
                                    • API String ID: 3899507212-0
                                    • Opcode ID: 94e0d933f76090302ed3b244dff3718ab45d94a9c4be65943588d19e700be0d5
                                    • Instruction ID: 8ecb114aab582adf582f95a04d8c79a89b719f66126bde27c61add5191d51713
                                    • Opcode Fuzzy Hash: 94e0d933f76090302ed3b244dff3718ab45d94a9c4be65943588d19e700be0d5
                                    • Instruction Fuzzy Hash: B91165726006448FEB20DF29E886766FBE8FF44210F08C86ADD49CF746D675E944CA71
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4111385655.000000000157A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0157A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_157a000_server.jbxd
                                    Similarity
                                    • API ID: CloseFind
                                    • String ID:
                                    • API String ID: 1863332320-0
                                    • Opcode ID: c47cb3c77f3878e3611af5344a2718e713c8c6c7339da71a650192eff9b07714
                                    • Instruction ID: 9e5daf5d8ba5a9440c1e2800070360449814cee2700fd0ef785d25460795c617
                                    • Opcode Fuzzy Hash: c47cb3c77f3878e3611af5344a2718e713c8c6c7339da71a650192eff9b07714
                                    • Instruction Fuzzy Hash: 6B11C2715097809FDB128F25DC85B52BFB4DF06620F0880DAED858F263D275A808CB62
                                    APIs
                                    • GetFileType.KERNELBASE(?,00000E24,4FFD7EB5,00000000,00000000,00000000,00000000), ref: 0157ACBD
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4111385655.000000000157A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0157A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_157a000_server.jbxd
                                    Similarity
                                    • API ID: FileType
                                    • String ID:
                                    • API String ID: 3081899298-0
                                    • Opcode ID: b34d8039cbc776bd97a38a6afdc6a017b81ca3dd844d8175c62a169ff9fed85a
                                    • Instruction ID: e74284643bbaeab0e0b842ae8b6b98cefcdb5ebceba51513a594337d772d2605
                                    • Opcode Fuzzy Hash: b34d8039cbc776bd97a38a6afdc6a017b81ca3dd844d8175c62a169ff9fed85a
                                    • Instruction Fuzzy Hash: 66010871500200AFE7218B19DD45BAAB7DCEF04224F08C466FD054F741D374A8488AB1
                                    APIs
                                    • WaitForInputIdle.USER32(?,?), ref: 0157B6D3
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4111385655.000000000157A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0157A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_157a000_server.jbxd
                                    Similarity
                                    • API ID: IdleInputWait
                                    • String ID:
                                    • API String ID: 2200289081-0
                                    • Opcode ID: b1c9fee6b3b79635628121521f028eda153cfbaa12a325303320324a9b007f5a
                                    • Instruction ID: 170be0a53f3ad88ea16155ac2963faa3d6795c1f350f1a44eb26037a12d7707b
                                    • Opcode Fuzzy Hash: b1c9fee6b3b79635628121521f028eda153cfbaa12a325303320324a9b007f5a
                                    • Instruction Fuzzy Hash: 3E11A3714083809FDB11CF15DD45B56FFE4EF46320F09849AED458F262D279A804CB71
                                    APIs
                                    • K32EnumProcesses.KERNEL32(?,?,?,4FFD7EB5,00000000,?,?,?,?,?,?,?,?,6C823C58), ref: 058008CA
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113616956.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5800000_server.jbxd
                                    Similarity
                                    • API ID: EnumProcesses
                                    • String ID:
                                    • API String ID: 84517404-0
                                    • Opcode ID: 26b7f37473c23e2e3a077774a92a9c8cfd7a83a64c06693347f296e8e2640766
                                    • Instruction ID: 51c93d5f581b5464bf25a88a2377bea919cb04e304d1a3dce2cb01a810e8bb8f
                                    • Opcode Fuzzy Hash: 26b7f37473c23e2e3a077774a92a9c8cfd7a83a64c06693347f296e8e2640766
                                    • Instruction Fuzzy Hash: 961152716046448FEB60CF65DC49B66FBE4EF44210F08846ADD45CB691D775D844CAA1
                                    APIs
                                    • WSAConnect.WS2_32(?,?,?,?,?,?,?), ref: 0580248E
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113616956.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5800000_server.jbxd
                                    Similarity
                                    • API ID: Connect
                                    • String ID:
                                    • API String ID: 3144859779-0
                                    • Opcode ID: 2b8fc46a8868e06428056e0c7b455a401c89379e58c2eee954838bd443808e1e
                                    • Instruction ID: 6b6bb5af7049649f598dc37b9e0cb57fa255d11a5afb2cff10886b64d6f667db
                                    • Opcode Fuzzy Hash: 2b8fc46a8868e06428056e0c7b455a401c89379e58c2eee954838bd443808e1e
                                    • Instruction Fuzzy Hash: 10115E36500A049FDBA0CF55D848B66FBE4EF08210F0888AADD4A8B655D375E858CBB1
                                    APIs
                                    • SetFileAttributesW.KERNELBASE(?,?), ref: 0157B9BF
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4111385655.000000000157A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0157A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_157a000_server.jbxd
                                    Similarity
                                    • API ID: AttributesFile
                                    • String ID:
                                    • API String ID: 3188754299-0
                                    • Opcode ID: 847f0a51e65c43103e83abf39a28fdf1a1fa1f39efe496572867254dd2990dbb
                                    • Instruction ID: 9ca1f315c4aee771bb4e5ce2855b578da1da8c4cbded56fcfb574f8d41a78c3d
                                    • Opcode Fuzzy Hash: 847f0a51e65c43103e83abf39a28fdf1a1fa1f39efe496572867254dd2990dbb
                                    • Instruction Fuzzy Hash: D301B9716006409FEB10CF2AE885766FBE4EF04220F08C4AADD45CF752D375D444CB61
                                    APIs
                                    • DeleteFileW.KERNELBASE(?), ref: 0157B908
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4111385655.000000000157A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0157A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_157a000_server.jbxd
                                    Similarity
                                    • API ID: DeleteFile
                                    • String ID:
                                    • API String ID: 4033686569-0
                                    • Opcode ID: 903d95a914469f7205a67ed1235d15fb43d72023bc1ac75b8551b33a4dccee85
                                    • Instruction ID: d305a2d2a4543c9205be00f768729770500ba6626525f5a67268c2e61900e6ae
                                    • Opcode Fuzzy Hash: 903d95a914469f7205a67ed1235d15fb43d72023bc1ac75b8551b33a4dccee85
                                    • Instruction Fuzzy Hash: 7501B572A002408FEB10CF29E886766FBD8EF04220F18C4AADD45CF742D779D844CAA2
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0157A5DE
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4111385655.000000000157A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0157A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_157a000_server.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: c92d9db3d07b5834198f1f0e8a285fa65fad347fe1f11635fb66de0aa58bc15a
                                    • Instruction ID: eee6df33c2b15edd5549a84f71b041733e08d3f1d125ad5a06ec14a5210da72b
                                    • Opcode Fuzzy Hash: c92d9db3d07b5834198f1f0e8a285fa65fad347fe1f11635fb66de0aa58bc15a
                                    • Instruction Fuzzy Hash: 54018E728006009FDB218F55D945B56FFE0EF48210F0888AADE464B612C336A414DFA2
                                    APIs
                                    • OleGetClipboard.OLE32(?,00000E24,?,?), ref: 0157A77E
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4111385655.000000000157A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0157A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_157a000_server.jbxd
                                    Similarity
                                    • API ID: Clipboard
                                    • String ID:
                                    • API String ID: 220874293-0
                                    • Opcode ID: 390cdc8c339132681a0f962af9fd760a56f703e0bf4ccf1d42b4f5281ba917bd
                                    • Instruction ID: e1959b3fa25bb459c395c92108899b81bff3c11a0316791e4dc3abe352850ba3
                                    • Opcode Fuzzy Hash: 390cdc8c339132681a0f962af9fd760a56f703e0bf4ccf1d42b4f5281ba917bd
                                    • Instruction Fuzzy Hash: 8301A271500600ABD250DF1ADD86B66FBE8FB88A20F148159EC089BB41D735F915CBE6
                                    APIs
                                    • RegQueryValueExW.KERNELBASE(?,00000E24,?,?), ref: 058016DA
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113616956.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5800000_server.jbxd
                                    Similarity
                                    • API ID: QueryValue
                                    • String ID:
                                    • API String ID: 3660427363-0
                                    • Opcode ID: c9aae37c34e80f790a8ce13038b5708399a2076b93900d6221212572ea6a5fc1
                                    • Instruction ID: e4414635f71fe28e6d86c4308da6f93f7db1df9d2a11f05aade409a4f4816ab3
                                    • Opcode Fuzzy Hash: c9aae37c34e80f790a8ce13038b5708399a2076b93900d6221212572ea6a5fc1
                                    • Instruction Fuzzy Hash: 9101A271500600ABD250DF1ADD86F66FBE8FB88A20F14811AEC089BB41D771F915CBE6
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4111385655.000000000157A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0157A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_157a000_server.jbxd
                                    Similarity
                                    • API ID: send
                                    • String ID:
                                    • API String ID: 2809346765-0
                                    • Opcode ID: bce66d7e09fbd561f43b7bc1200863efc4292b2a5de48002d105d332e38bbef9
                                    • Instruction ID: fa3d5c5700e2a69dbaf0f49ec3693966d74c5e3e97fd7ada01f02a268d1cdcce
                                    • Opcode Fuzzy Hash: bce66d7e09fbd561f43b7bc1200863efc4292b2a5de48002d105d332e38bbef9
                                    • Instruction Fuzzy Hash: F50192729046409FEB20CF59E945B56FBE4FF44320F08C8AADD454F612D375A448CBA1
                                    APIs
                                    • WaitForInputIdle.USER32(?,?), ref: 0157B6D3
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4111385655.000000000157A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0157A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_157a000_server.jbxd
                                    Similarity
                                    • API ID: IdleInputWait
                                    • String ID:
                                    • API String ID: 2200289081-0
                                    • Opcode ID: dbbe38c807b6ec89c6fbb9a798cea4cf15d0d1b178924255457460dc3903732f
                                    • Instruction ID: aa4f71d300531338f8506bd3fefa43aab03d02b9505881c860fa8ce0dcaba76a
                                    • Opcode Fuzzy Hash: dbbe38c807b6ec89c6fbb9a798cea4cf15d0d1b178924255457460dc3903732f
                                    • Instruction Fuzzy Hash: E30184719046409FEB10DF19E945765FBE4EF44220F08C8AADD458F656D379A444CBB1
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4111385655.000000000157A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0157A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_157a000_server.jbxd
                                    Similarity
                                    • API ID: CloseFind
                                    • String ID:
                                    • API String ID: 1863332320-0
                                    • Opcode ID: 941984f04962b943e7687748e5f0ca4f72600176b914a6686e1a58ce7537a727
                                    • Instruction ID: 50e6d0a45f827538b6cdedd02e3843515ce40558f2c319d1885624d102a57108
                                    • Opcode Fuzzy Hash: 941984f04962b943e7687748e5f0ca4f72600176b914a6686e1a58ce7537a727
                                    • Instruction Fuzzy Hash: 2501A9755006448FDB109F19E986765FBE4EF04624F08C4AADD468F752D37AE848CEA2
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113496277.0000000005690000.00000040.00000800.00020000.00000000.sdmp, Offset: 05690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5690000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \Ok
                                    • API String ID: 0-3677890257
                                    • Opcode ID: 810f62594c6c6980843750a7e9a5dc08d8ec3369b07bfac603c3fcc7c950ae87
                                    • Instruction ID: 69f9f2de3cfa16f50bb30e82b6fbc7f44ff491c6ea4bd1589f35c77f82e404d3
                                    • Opcode Fuzzy Hash: 810f62594c6c6980843750a7e9a5dc08d8ec3369b07bfac603c3fcc7c950ae87
                                    • Instruction Fuzzy Hash: 41D1F874A01228CFDB29DB74D994BADB7B6FB49304F1041EAD509AB394DB399E81CF40
                                    APIs
                                    • SetErrorMode.KERNELBASE(?), ref: 0157AA44
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4111385655.000000000157A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0157A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_157a000_server.jbxd
                                    Similarity
                                    • API ID: ErrorMode
                                    • String ID:
                                    • API String ID: 2340568224-0
                                    • Opcode ID: 1323d2367fa54d8062f5eecda1b62453d6be8cde511b54a2fe7df3b2ccb5a2f0
                                    • Instruction ID: d474f467361a92852b3aa874b6091498ca4db4789282a1da7626de6f1342efb6
                                    • Opcode Fuzzy Hash: 1323d2367fa54d8062f5eecda1b62453d6be8cde511b54a2fe7df3b2ccb5a2f0
                                    • Instruction Fuzzy Hash: 16F0F431800640CFDB209F19E989769FBE0EF44220F0CC4AADD050F752D3B9A848CFA2
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113496277.0000000005690000.00000040.00000800.00020000.00000000.sdmp, Offset: 05690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5690000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \Ok
                                    • API String ID: 0-3677890257
                                    • Opcode ID: ccc8c1a39d546b8c5d2632d114858b0ffae11b1e0bf808e7674d6cfb1b7ddd7c
                                    • Instruction ID: 56a79902b0cd77a4b6717d9e30b3924b7626626459373d6f147b878f351e5210
                                    • Opcode Fuzzy Hash: ccc8c1a39d546b8c5d2632d114858b0ffae11b1e0bf808e7674d6cfb1b7ddd7c
                                    • Instruction Fuzzy Hash: 7CB11A70A01228CFDB29DB74D9957ADB7B6FB89304F5041AAD509AB390DF399E81CF40
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113496277.0000000005690000.00000040.00000800.00020000.00000000.sdmp, Offset: 05690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5690000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 2k
                                    • API String ID: 0-1599061190
                                    • Opcode ID: a1385a5bc71640dfedae328f875f6089df498a1c405353a4e838aa537f23723d
                                    • Instruction ID: a62b0dc2ac2488ad888d3a1d710cf35194c863e9aac86bf22e3b79f52720b88b
                                    • Opcode Fuzzy Hash: a1385a5bc71640dfedae328f875f6089df498a1c405353a4e838aa537f23723d
                                    • Instruction Fuzzy Hash: B0413A30A00218CFDB28DBB5C955BECB7B2BF45308F5045A9D009AB794DB794E85CF61
                                    APIs
                                    • CloseHandle.KERNELBASE(?), ref: 0157ABF0
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4111385655.000000000157A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0157A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_157a000_server.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: a7b949fc32122ed5a08b03ac2829f2f0cece103c066fe685a6ae1db57f501715
                                    • Instruction ID: 1a0dd5e727d48b89020db277a4e355d1c223dc0ed1f9dac5dabda6a3ab7b77a1
                                    • Opcode Fuzzy Hash: a7b949fc32122ed5a08b03ac2829f2f0cece103c066fe685a6ae1db57f501715
                                    • Instruction Fuzzy Hash: B421F6715097809FD7028F29EC95752BFA8EF06220F0D84DAED858F2A3D2345908CB61
                                    APIs
                                    • CloseHandle.KERNELBASE(?), ref: 0157BD50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4111385655.000000000157A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0157A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_157a000_server.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: 77b41bb19fcce0b82e5e0077fc87aa9ab8fe8a369693506ef35932c45765b5b3
                                    • Instruction ID: 6c5e3a909cb474ea16066d2d96194c15ced87ed1fecd592688b9eca5570c72a1
                                    • Opcode Fuzzy Hash: 77b41bb19fcce0b82e5e0077fc87aa9ab8fe8a369693506ef35932c45765b5b3
                                    • Instruction Fuzzy Hash: EF21DE725097C05FDB028B25DC95B92BFB4AF07220F0984DAE8858F663D234A908CB62
                                    APIs
                                    • CloseHandle.KERNELBASE(?), ref: 0157A690
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4111385655.000000000157A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0157A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_157a000_server.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: ce36ee73801b5f8e277575bc882a330f9827a581deb5d1e3a2d5e9bfe94123a7
                                    • Instruction ID: 5fd39961ba605f9055ec46637f9802b2b39580c2f83b36bdea18faf49e867986
                                    • Opcode Fuzzy Hash: ce36ee73801b5f8e277575bc882a330f9827a581deb5d1e3a2d5e9bfe94123a7
                                    • Instruction Fuzzy Hash: 1721587180D3C05FDB138B259C95656BFB4EF47220F0D84DBD9848F2A3D269A908CBB2
                                    APIs
                                    • CloseHandle.KERNELBASE(?), ref: 0157BD50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4111385655.000000000157A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0157A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_157a000_server.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: 8bb8d90c0e6b7181b01b9a0d8931fbcc96e51f1d1131b0e7eef42cfa663de0b2
                                    • Instruction ID: 64b9ea8d9300ad1cfc7843f14e99e33a7823b4bbbcce4ca8645a6fb3a47a375d
                                    • Opcode Fuzzy Hash: 8bb8d90c0e6b7181b01b9a0d8931fbcc96e51f1d1131b0e7eef42cfa663de0b2
                                    • Instruction Fuzzy Hash: 8001A7719006408FDB10DF19E98A756FBE4EF44220F08C4BADD4A8F756D275E848CBB2
                                    APIs
                                    • CloseHandle.KERNELBASE(?), ref: 0157ABF0
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4111385655.000000000157A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0157A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_157a000_server.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: 01dc6a37c4502beab1906c4fcd225d759812c8e6bf53259a1e45a858b4c3b47f
                                    • Instruction ID: cd2d1a4ae8eea634557fe29e9fe086c696bc6364bd3094dd5c6996e0eafc7e00
                                    • Opcode Fuzzy Hash: 01dc6a37c4502beab1906c4fcd225d759812c8e6bf53259a1e45a858b4c3b47f
                                    • Instruction Fuzzy Hash: 470184719046449FEB108F19E98576AFBE8EF44220F0CC8AAED498F656D279D844CAA1
                                    APIs
                                    • CloseHandle.KERNELBASE(?), ref: 0157A690
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4111385655.000000000157A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0157A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_157a000_server.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: b662de58bf54dfa19aa25d8bcfd619cf8bd36fb90cfb1998629f88ca0ecaac2c
                                    • Instruction ID: 3e705d856d48c8601de36db6c297040f62985994d65c58774a6e6d5fca79aa49
                                    • Opcode Fuzzy Hash: b662de58bf54dfa19aa25d8bcfd619cf8bd36fb90cfb1998629f88ca0ecaac2c
                                    • Instruction Fuzzy Hash: 4E01D6719002408FEB10CF19E98976AFBE4EF44220F0CC8AADD498F756D379E444CEA2
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113496277.0000000005690000.00000040.00000800.00020000.00000000.sdmp, Offset: 05690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5690000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d07c2d216c93ec7e3272ec327ab57a1de8a32e144f1141a8b5d3a0cdbfaca346
                                    • Instruction ID: b4501641ae241376302bbe32e88b51b89642f2d94cb3340ffbe97bba7b31e46f
                                    • Opcode Fuzzy Hash: d07c2d216c93ec7e3272ec327ab57a1de8a32e144f1141a8b5d3a0cdbfaca346
                                    • Instruction Fuzzy Hash: C2C26C34B00165DFEF258B29E9107A97BF6FB4D704F0044AB984997B84CB389DA5EF60
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113496277.0000000005690000.00000040.00000800.00020000.00000000.sdmp, Offset: 05690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5690000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 035004433490fadbd8c3216474ad00cfdd851059d18dbab0854a6377b5b606dc
                                    • Instruction ID: 3470103e8410ab7e7b7384219d83ada3a359e58487f039de8f2616869975134f
                                    • Opcode Fuzzy Hash: 035004433490fadbd8c3216474ad00cfdd851059d18dbab0854a6377b5b606dc
                                    • Instruction Fuzzy Hash: 2C929234704160DBEF258B29D9107AD7BABFB4D714F00446B9889A7B84CF3C9DA5EB60
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113496277.0000000005690000.00000040.00000800.00020000.00000000.sdmp, Offset: 05690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5690000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: cce873c064338ac1fa396a73ffda6a7fb6108a9a309dd00306675b16db4aef62
                                    • Instruction ID: d1e8c026667367643b436e0ffed7aaa0ef85d2b404582ae089ce40eae1555c2e
                                    • Opcode Fuzzy Hash: cce873c064338ac1fa396a73ffda6a7fb6108a9a309dd00306675b16db4aef62
                                    • Instruction Fuzzy Hash: 6FD14C30B00215EFDB09DFB5E45156E77B6FF88248B608529E816A73A4DF3E9C52CB90
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113496277.0000000005690000.00000040.00000800.00020000.00000000.sdmp, Offset: 05690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5690000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 20922a32322d570a3b8b359d0c90b7ecee12b25f6f87440c335eecc855e8000a
                                    • Instruction ID: ac223753e269b5c181517043d359cad89433192e18d1aefd0c5dbcc9ea73f88e
                                    • Opcode Fuzzy Hash: 20922a32322d570a3b8b359d0c90b7ecee12b25f6f87440c335eecc855e8000a
                                    • Instruction Fuzzy Hash: 58A13C34B00215DFDB19DBB4E45166E77B6FF98348B60802EE816973A4DF3A9C62CB50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113496277.0000000005690000.00000040.00000800.00020000.00000000.sdmp, Offset: 05690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5690000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 770bb62f7af0d347d00c0add87d03b3d824cfff8ddd2c71c8c3c2b07c34e8fcd
                                    • Instruction ID: 38bcc6df762908a4ca048bee19dd3bc550ccba399c00345e8ea8c24070d060ad
                                    • Opcode Fuzzy Hash: 770bb62f7af0d347d00c0add87d03b3d824cfff8ddd2c71c8c3c2b07c34e8fcd
                                    • Instruction Fuzzy Hash: CF913B34B00215DFDB19DBB4E45156E73B6FF98248B60842EE816973A4DF3E9C62CB90
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113496277.0000000005690000.00000040.00000800.00020000.00000000.sdmp, Offset: 05690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5690000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e2ff15cfe208f8377e7578771e06770d317d78a2438225d1a6666abd042e315a
                                    • Instruction ID: 54732a4bee876eb2502a122855969dba1e856f7e8938ec8d78bff718f802aa47
                                    • Opcode Fuzzy Hash: e2ff15cfe208f8377e7578771e06770d317d78a2438225d1a6666abd042e315a
                                    • Instruction Fuzzy Hash: 35813A34B00214DFDB19DB74E45166E73B6FF98248B60852EE816973A4DF3E9C62CB90
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113496277.0000000005690000.00000040.00000800.00020000.00000000.sdmp, Offset: 05690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5690000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5c766afc4cf260a58b413b19ba4af806b47f98e2eb2715bee7d23d4140860e0b
                                    • Instruction ID: 63f7af05b1854787297bfeede3491b4351c4e86aaa816f06d93a8b4b91ba1670
                                    • Opcode Fuzzy Hash: 5c766afc4cf260a58b413b19ba4af806b47f98e2eb2715bee7d23d4140860e0b
                                    • Instruction Fuzzy Hash: 89913F70A00224CFDB29DB74D9957ADB7B6EF89308F5041A995096B390DF399E82CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113496277.0000000005690000.00000040.00000800.00020000.00000000.sdmp, Offset: 05690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5690000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 24a786dd61b9c09dbd2a311fb8ec2278f1a96199fa9500f35d03a6f38c923a44
                                    • Instruction ID: 275efb3b7824bdb36d3bcacf705844746fed72235de34e025825a918c99a2b93
                                    • Opcode Fuzzy Hash: 24a786dd61b9c09dbd2a311fb8ec2278f1a96199fa9500f35d03a6f38c923a44
                                    • Instruction Fuzzy Hash: 70714B34B00214DFDB199B74E45166E73B6FF98318B60852EE806977A4DF3E9C62CB90
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113496277.0000000005690000.00000040.00000800.00020000.00000000.sdmp, Offset: 05690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5690000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3519d57859d80c94e1aa0187763b12c86f822d3477972c70394fd139670e8bef
                                    • Instruction ID: 9918870dc7173b56415ee6dec8e5ea21d36bfc0baf139a0066f9fa48c4f2f02a
                                    • Opcode Fuzzy Hash: 3519d57859d80c94e1aa0187763b12c86f822d3477972c70394fd139670e8bef
                                    • Instruction Fuzzy Hash: 8C613E70A40228CFDB29DB74D895BADB7B6FF85308F1041AA95096B390DF399D86CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113496277.0000000005690000.00000040.00000800.00020000.00000000.sdmp, Offset: 05690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5690000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 40548d18ecce47bd19dd071ab395ce3f399b953480ee46cd97dc2db75fb28f6b
                                    • Instruction ID: 25e7115ebca4ca761d220c4b3fab26186f1553b0937a058c1d842518a373ea67
                                    • Opcode Fuzzy Hash: 40548d18ecce47bd19dd071ab395ce3f399b953480ee46cd97dc2db75fb28f6b
                                    • Instruction Fuzzy Hash: EB515D34B00115DFDB189BB8E45166E73A6EF88218F20852EE816977A4DF3D9C21CB90
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113496277.0000000005690000.00000040.00000800.00020000.00000000.sdmp, Offset: 05690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5690000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c111acbd23bed58df927add87721ae9921e49cb7a25d5705097769f6fadf11e0
                                    • Instruction ID: c4e9f156dcee9019d0a4893e0cc1e9421fac92c2a2ce73a265b5a7d32a30e47b
                                    • Opcode Fuzzy Hash: c111acbd23bed58df927add87721ae9921e49cb7a25d5705097769f6fadf11e0
                                    • Instruction Fuzzy Hash: EA31A070B002059FDF18CBB9D958BAEBBE6BF88614F248129E405EB790DF749C05CB90
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4112667707.0000000001A90000.00000040.00000020.00020000.00000000.sdmp, Offset: 01A90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_1a90000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 02819752b450b9f18a2decb1606c034ac5b01139cfc144153c9dc6b8081c18c6
                                    • Instruction ID: 71ba72006e59f0f3eb8a97d0dc854b82484f3380d3f4ccc6ad28fba1765fc509
                                    • Opcode Fuzzy Hash: 02819752b450b9f18a2decb1606c034ac5b01139cfc144153c9dc6b8081c18c6
                                    • Instruction Fuzzy Hash: 0E214F3510D7C08FDB13CB20D950B55BFB5AF47218F1986DED8858B6A3C33A9946CBA2
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4114903928.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6920000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0cf768790c77ec2860d3984a3f2d87a72e06b6bf5101c09e72b1df1ed39b0a5f
                                    • Instruction ID: bc6539142b6a28dc942a86bd658259574ac3ce1d8b1aa78954410b545f71033f
                                    • Opcode Fuzzy Hash: 0cf768790c77ec2860d3984a3f2d87a72e06b6bf5101c09e72b1df1ed39b0a5f
                                    • Instruction Fuzzy Hash: 1E11EAB5908301AFC350CF19D840A5BFBE4FB88664F04896EF898D7311D235E9048FA2
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113496277.0000000005690000.00000040.00000800.00020000.00000000.sdmp, Offset: 05690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5690000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6967fcac8f3184bc49823e9296e4d804ad40fc23b0e2dd00a215cd83e457c41e
                                    • Instruction ID: a3749d8cbb5e328331f18305ec0ebade44ecc505a3d339fc67abc5949f00b5f7
                                    • Opcode Fuzzy Hash: 6967fcac8f3184bc49823e9296e4d804ad40fc23b0e2dd00a215cd83e457c41e
                                    • Instruction Fuzzy Hash: 6D11C03422A3818FC7262738A8140A93BB6DFC322571405FFD485DF3A2CB2E4C4AC362
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4112667707.0000000001A90000.00000040.00000020.00020000.00000000.sdmp, Offset: 01A90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_1a90000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0a1720567fd7345a35872b4d22e221bb4d6648b473d18e3303402238b09c2888
                                    • Instruction ID: a4cc11cd4a2c2aa7d41d98e9d40dcfde12d147d00417cb1b6f06999aba3ddfc6
                                    • Opcode Fuzzy Hash: 0a1720567fd7345a35872b4d22e221bb4d6648b473d18e3303402238b09c2888
                                    • Instruction Fuzzy Hash: 3911DA31204244DFEB15CB14D640B16F7E9AB89708F28C9ACF9499B753C77BD883C651
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113496277.0000000005690000.00000040.00000800.00020000.00000000.sdmp, Offset: 05690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5690000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 43da8c9dae8ac2d6e2a6acf9cc3e41ba6e0a2e9d14153f4ecb9309a8ccc60213
                                    • Instruction ID: f44f2bde4e3036d2856b39f48e5b24dfc461fd1455d917453bfa75bc34f02a1a
                                    • Opcode Fuzzy Hash: 43da8c9dae8ac2d6e2a6acf9cc3e41ba6e0a2e9d14153f4ecb9309a8ccc60213
                                    • Instruction Fuzzy Hash: B4115A31B002558FCB55DBBC98115AEBBF6EB8A25872045BEC405E7350DB3A4D12CBA0
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4111469242.000000000158A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0158A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_158a000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ecc6bcd9f94649e71e03c98c0b0b9000da0011d7860f62e456fc96f6a6459696
                                    • Instruction ID: 04efaa38f0b6b6600bc0f714766e63922a0b165757ac5560ff575adc0a81f94d
                                    • Opcode Fuzzy Hash: ecc6bcd9f94649e71e03c98c0b0b9000da0011d7860f62e456fc96f6a6459696
                                    • Instruction Fuzzy Hash: 6B11FAB5908301AFD350CF19DC45E5BFBE8EB88660F04892EF95997311D375E9088FA2
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4114903928.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6920000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 07be26a2e79b4e578750eb9084ea2d74dc760eab4c0aeb1cf67a778accf0d2c8
                                    • Instruction ID: 0b27681485eaa4a0effee754fdb0c729b149ed0f7a34e789249f631695b24806
                                    • Opcode Fuzzy Hash: 07be26a2e79b4e578750eb9084ea2d74dc760eab4c0aeb1cf67a778accf0d2c8
                                    • Instruction Fuzzy Hash: 9B11FAB5908301AFD350CF19DC85E5BFBE8EB88660F04882EF95997311D235E9088FA2
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113496277.0000000005690000.00000040.00000800.00020000.00000000.sdmp, Offset: 05690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5690000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: baa3a6237bf9552beffd1a8938950530d05111c0407ef3730934352d4aa3f60a
                                    • Instruction ID: 543a3837eac66230db5a36538a5b044354575c37d3ae388e4d9955e0793f95c3
                                    • Opcode Fuzzy Hash: baa3a6237bf9552beffd1a8938950530d05111c0407ef3730934352d4aa3f60a
                                    • Instruction Fuzzy Hash: 91113D74E01118CFEF28DBB9C8947ECB7B1BF48204F50456AC41AAB380C7744945CF61
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4112667707.0000000001A90000.00000040.00000020.00020000.00000000.sdmp, Offset: 01A90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_1a90000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 461010e1789382c359a8340c923079a78ea4f14d9f7f53c7284846ec1582ffbb
                                    • Instruction ID: a538830840624c9e3902305f4240e7199c7d13ad6342a51909724e4429aa0b96
                                    • Opcode Fuzzy Hash: 461010e1789382c359a8340c923079a78ea4f14d9f7f53c7284846ec1582ffbb
                                    • Instruction Fuzzy Hash: 4DF0F9B64087806FC7118B15AC40863FFB8EB86230709C4AFEC498B712D235B808C7B1
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113496277.0000000005690000.00000040.00000800.00020000.00000000.sdmp, Offset: 05690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5690000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 00080807a8786d4ce192dc5cd6d0446fa1b034edc2b7d19ed5449438be68209a
                                    • Instruction ID: 1457aaad1b9f7e0ef8d7f1aed66ac721f71a41ea94378660aa39209d22749896
                                    • Opcode Fuzzy Hash: 00080807a8786d4ce192dc5cd6d0446fa1b034edc2b7d19ed5449438be68209a
                                    • Instruction Fuzzy Hash: 20015B34616202CFC714EB28E55CAAC77E2FF84219F408C6CA4568B719EB799C489B92
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113496277.0000000005690000.00000040.00000800.00020000.00000000.sdmp, Offset: 05690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5690000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2226ddf3b263793070b53b66db11080c432169d30863de190cfa5d01ec4015a2
                                    • Instruction ID: eacc2a6cea21294be07aba72600dfd9fbb1bada6ebc4120a50665f14fbb50ab1
                                    • Opcode Fuzzy Hash: 2226ddf3b263793070b53b66db11080c432169d30863de190cfa5d01ec4015a2
                                    • Instruction Fuzzy Hash: 9D011E7144A3829FE313C720E859B817FA8BB52718F4A86DBC040CF5A7D3AC9949D762
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4112667707.0000000001A90000.00000040.00000020.00020000.00000000.sdmp, Offset: 01A90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_1a90000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c438a27276e0968fcdc2a499c6d87a0b64f2769294ce5e65665db8adb6b8d55a
                                    • Instruction ID: 79eb8b3c1d3fe0e19283268be3316530923c2563ae4b47afb5ddf81fff41806e
                                    • Opcode Fuzzy Hash: c438a27276e0968fcdc2a499c6d87a0b64f2769294ce5e65665db8adb6b8d55a
                                    • Instruction Fuzzy Hash: 83F0FB35104644DFC706CB04D680B15FBE6EB89718F24CAA9E9494B752C737A852DA81
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4112667707.0000000001A90000.00000040.00000020.00020000.00000000.sdmp, Offset: 01A90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_1a90000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c2ee505fb1eb58ae09fa070e268befbee4a8f2a02bf9a4f0757193406ab346ea
                                    • Instruction ID: 07bd356d40a40cb143ee4e5eb15ae5c9e34adf2e98dbac37074afc1415526b0b
                                    • Opcode Fuzzy Hash: c2ee505fb1eb58ae09fa070e268befbee4a8f2a02bf9a4f0757193406ab346ea
                                    • Instruction Fuzzy Hash: 14E092B6A006004BD650CF0AFC41452F7D8EB84630708C47FDC0D8BB01E239B908CAE5
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4111469242.000000000158A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0158A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_158a000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 671f7eea791a1eeb3a37049e884418e38741aa5da7f8e8d0ecffd943de3ab684
                                    • Instruction ID: df5c2f4d374b7e2d62074ebb56efc7995c0f22e71cf1a4c790df71c95df4febc
                                    • Opcode Fuzzy Hash: 671f7eea791a1eeb3a37049e884418e38741aa5da7f8e8d0ecffd943de3ab684
                                    • Instruction Fuzzy Hash: 38E0D8B294020467D3108F0A9C46F53FB98DB50A31F08C567ED095B701E276B9048AF1
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4114903928.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6920000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 894e3753979ff009621a630bdd5add6febecc227336e1c4e0e1d3c95c980bedd
                                    • Instruction ID: 95b873dd6dabca8340a5bcedcd9f8f0f734df0c664afcde69a250dc8aa16a51a
                                    • Opcode Fuzzy Hash: 894e3753979ff009621a630bdd5add6febecc227336e1c4e0e1d3c95c980bedd
                                    • Instruction Fuzzy Hash: 51E0D8B290020467D2509E0A9C46F53FBD8DB40A30F08C467ED091B702E176B90489F1
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4114903928.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6920000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 01946c29bdf914ff7ff657c36bd96b1b5cb8d216fe4fd413a7c8c76ebc0d1d5b
                                    • Instruction ID: fefcd8a671c5aed0e4d9f10b44dffb363ede4196d9634763379e762b4c0f85a6
                                    • Opcode Fuzzy Hash: 01946c29bdf914ff7ff657c36bd96b1b5cb8d216fe4fd413a7c8c76ebc0d1d5b
                                    • Instruction Fuzzy Hash: DCE0D8B290020067D2109E0A9C4AF53FBD8DB80A30F08C467ED091B701E176B914C9F1
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4114903928.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6920000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d110968dcc53e65ab9ce69b66ed0d3866cabeef084d8d06b7e87d41be1ac475c
                                    • Instruction ID: d02dbfab11faa8f51389c00ac168e6f631f1837c8107cba41b96748c5173e7b8
                                    • Opcode Fuzzy Hash: d110968dcc53e65ab9ce69b66ed0d3866cabeef084d8d06b7e87d41be1ac475c
                                    • Instruction Fuzzy Hash: 07E0D8B294020067D3108E0A9C46F53FBD8DB94A31F08C46BFD091B741E176B91489F1
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113496277.0000000005690000.00000040.00000800.00020000.00000000.sdmp, Offset: 05690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5690000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e95184359733b94c19e146f539ca49a193ac8806c2defc62342ab940675f0793
                                    • Instruction ID: 79e0dca96407bdc5e2e5df696e429978ce32bed6382a12a985b9a70e131aa641
                                    • Opcode Fuzzy Hash: e95184359733b94c19e146f539ca49a193ac8806c2defc62342ab940675f0793
                                    • Instruction Fuzzy Hash: 10E08630A5A384DFC745CF7899114DC7FB4AB5221871101EBD445DF262D6350E49DB12
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113496277.0000000005690000.00000040.00000800.00020000.00000000.sdmp, Offset: 05690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5690000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8c199cab2177ee6df3d542525e4b2680d52f6c5ebcba18117cd9acc09430bf6d
                                    • Instruction ID: 78a6740bc46597cfab92e5b30a7da39219bdcfa1973408dbceb204ed6dbe2dfa
                                    • Opcode Fuzzy Hash: 8c199cab2177ee6df3d542525e4b2680d52f6c5ebcba18117cd9acc09430bf6d
                                    • Instruction Fuzzy Hash: 6BE08C3090A3848FCB068BB4A9190FC3FB49A1311031401DFC855DB623C92A090AC712
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4111366839.0000000001572000.00000040.00000800.00020000.00000000.sdmp, Offset: 01572000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_1572000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 251d8791fb02ab6ee4bf3e55fce897ecdfa7106f59838405a7455fc56bf5bac4
                                    • Instruction ID: 033056d0d279bc670656b12051d8a0b80493d8d21101bb760034e0bb1a4dc5ac
                                    • Opcode Fuzzy Hash: 251d8791fb02ab6ee4bf3e55fce897ecdfa7106f59838405a7455fc56bf5bac4
                                    • Instruction Fuzzy Hash: 2FD02E3A2006C08FE3228A0CD2A5F893BE4BB40708F4A04F9A800CF763C768D480C200
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4111366839.0000000001572000.00000040.00000800.00020000.00000000.sdmp, Offset: 01572000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_1572000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ad7a5aeaab19c60426b62333c0de322046c035f0d54a4555b7e72e7e1a31a775
                                    • Instruction ID: 2762dfed0779a3ea96c7286610e2454081ea0a4b0426aecd5562b7abd916cbc4
                                    • Opcode Fuzzy Hash: ad7a5aeaab19c60426b62333c0de322046c035f0d54a4555b7e72e7e1a31a775
                                    • Instruction Fuzzy Hash: 7ED05E342006814FD725DA0CD2D5F5D3BD4BF40714F0644ECAC108F762C7A4D8C0DA00
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4113496277.0000000005690000.00000040.00000800.00020000.00000000.sdmp, Offset: 05690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5690000_server.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5487e478d8f49ff928bdc7030a14bca8e5f5158d667b870a17e6d0112db9936d
                                    • Instruction ID: b573c433ddd39a2e918c39a1a9ae29c43834ff4c3b14db1bc7ce5ffc09ee0027
                                    • Opcode Fuzzy Hash: 5487e478d8f49ff928bdc7030a14bca8e5f5158d667b870a17e6d0112db9936d
                                    • Instruction Fuzzy Hash: 23D0A930A01208EF8B00DFA8D90089DBBF8EB05208B0000AAA809E7700EE311E08EB81