Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
server.exe

Overview

General Information

Sample name:server.exe
Analysis ID:1584742
MD5:e4b99200fb42ee229fbb41f2cf56d8f8
SHA1:edf6652f563fdc69788fb9c4e8b9499c412095fd
SHA256:adae7b74db9b2c08abcc5f6b0165896726a36eb412e780710e242a97b12554f9
Tags:exeNjRATuser-lontze7
Infos:

Detection

Njrat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Njrat
.NET source code contains potential unpacker
AI detected suspicious sample
Contains functionality to disable the Task Manager (.Net Source)
Contains functionality to spread to USB devices (.Net source)
Disables zone checking for all users
Drops PE files to the document folder of the user
Drops PE files to the startup folder
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies the windows firewall
Sigma detected: Potentially Suspicious Malware Callback Communication
Uses netsh to modify the Windows network and firewall settings
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates a window with clipboard capturing capabilities
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the program root directory (C:\Program Files)
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May infect USB drives
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Startup Folder File Write
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • server.exe (PID: 7596 cmdline: "C:\Users\user\Desktop\server.exe" MD5: E4B99200FB42EE229FBB41F2CF56D8F8)
    • netsh.exe (PID: 7668 cmdline: netsh firewall add allowedprogram "C:\Users\user\Desktop\server.exe" "server.exe" ENABLE MD5: 4E89A1A088BE715D6C946E55AB07C7DF)
      • conhost.exe (PID: 7684 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
NjRATRedPacket Security describes NJRat as "a remote access trojan (RAT) has capabilities to log keystrokes, access the victim's camera, steal credentials stored in browsers, open a reverse shell, upload/download files, view the victim's desktop, perform process, file, and registry manipulations, and capabilities to let the attacker update, uninstall, restart, close, disconnect the RAT and rename its campaign ID. Through the Command & Control (CnC) server software, the attacker has capabilities to create and configure the malware to spread through USB drives."It is supposedly popular with actors in the Middle East. Similar to other RATs, many leaked builders may be backdoored.
  • AQUATIC PANDA
  • Earth Lusca
  • Operation C-Major
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.njrat
{"Campaign ID": "HacKed", "Version": "0.7d", "Install Name": "dc81ba2078dcc6e9b83f78a887be4629", "Install Dir": "Adobe Update", "Registry Value": "Software\\Microsoft\\Windows\\CurrentVersion\\Run", "Network Seprator": "|'|'|"}
SourceRuleDescriptionAuthorStrings
server.exeJoeSecurity_NjratYara detected NjratJoe Security
    server.exeWindows_Trojan_Njrat_30f3c220unknownunknown
    • 0x115d2:$a1: get_Registry
    • 0x15a27:$a2: SEE_MASK_NOZONECHECKS
    • 0x156c9:$a3: Download ERROR
    • 0x15c79:$a4: cmd.exe /c ping 0 -n 2 & del "
    • 0x13c06:$a5: netsh firewall delete allowedprogram "
    server.exeCN_disclosed_20180208_cDetects malware from disclosed CN malware setFlorian Roth
    • 0x15c79:$x1: cmd.exe /c ping 0 -n 2 & del "
    • 0x13792:$s1: winmgmts:\\.\root\SecurityCenter2
    • 0x156e7:$s3: Executed As
    • 0x124f0:$s5: Stub.exe
    • 0x156c9:$s6: Download ERROR
    • 0x13754:$s8: Select * From AntiVirusProduct
    server.execrimeware_njrat_stringsDetects njRAT based on some stringsSekoia.io
    • 0x1546b:$: set cdaudio door closed
    • 0x1542f:$: set cdaudio door open
    • 0x15c8f:$: ping 0
    • 0x13412:$: [endof]
    • 0x132cc:$: TiGeR-Firewall
    • 0x132fa:$: NetSnifferCs
    • 0x132b8:$: IPBlocker
    • 0x13314:$: Sandboxie Control
    server.exeNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
    • 0x15a27:$reg: SEE_MASK_NOZONECHECKS
    • 0x156ad:$msg: Execute ERROR
    • 0x15701:$msg: Execute ERROR
    • 0x15c79:$ping: cmd.exe /c ping 0 -n 2 & del
    Click to see the 1 entries
    SourceRuleDescriptionAuthorStrings
    C:\Program Files (x86)\Explower.exeJoeSecurity_NjratYara detected NjratJoe Security
      C:\Program Files (x86)\Explower.exeWindows_Trojan_Njrat_30f3c220unknownunknown
      • 0x115d2:$a1: get_Registry
      • 0x15a27:$a2: SEE_MASK_NOZONECHECKS
      • 0x156c9:$a3: Download ERROR
      • 0x15c79:$a4: cmd.exe /c ping 0 -n 2 & del "
      • 0x13c06:$a5: netsh firewall delete allowedprogram "
      C:\Program Files (x86)\Explower.exeCN_disclosed_20180208_cDetects malware from disclosed CN malware setFlorian Roth
      • 0x15c79:$x1: cmd.exe /c ping 0 -n 2 & del "
      • 0x13792:$s1: winmgmts:\\.\root\SecurityCenter2
      • 0x156e7:$s3: Executed As
      • 0x124f0:$s5: Stub.exe
      • 0x156c9:$s6: Download ERROR
      • 0x13754:$s8: Select * From AntiVirusProduct
      C:\Program Files (x86)\Explower.execrimeware_njrat_stringsDetects njRAT based on some stringsSekoia.io
      • 0x1546b:$: set cdaudio door closed
      • 0x1542f:$: set cdaudio door open
      • 0x15c8f:$: ping 0
      • 0x13412:$: [endof]
      • 0x132cc:$: TiGeR-Firewall
      • 0x132fa:$: NetSnifferCs
      • 0x132b8:$: IPBlocker
      • 0x13314:$: Sandboxie Control
      C:\Program Files (x86)\Explower.exeNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
      • 0x15a27:$reg: SEE_MASK_NOZONECHECKS
      • 0x156ad:$msg: Execute ERROR
      • 0x15701:$msg: Execute ERROR
      • 0x15c79:$ping: cmd.exe /c ping 0 -n 2 & del
      Click to see the 49 entries
      SourceRuleDescriptionAuthorStrings
      00000000.00000000.1656549731.0000000000DC2000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_NjratYara detected NjratJoe Security
        00000000.00000000.1656549731.0000000000DC2000.00000002.00000001.01000000.00000003.sdmpWindows_Trojan_Njrat_30f3c220unknownunknown
        • 0x113d2:$a1: get_Registry
        • 0x15827:$a2: SEE_MASK_NOZONECHECKS
        • 0x154c9:$a3: Download ERROR
        • 0x15a79:$a4: cmd.exe /c ping 0 -n 2 & del "
        • 0x13a06:$a5: netsh firewall delete allowedprogram "
        00000000.00000000.1656549731.0000000000DC2000.00000002.00000001.01000000.00000003.sdmpNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
        • 0x15827:$reg: SEE_MASK_NOZONECHECKS
        • 0x154ad:$msg: Execute ERROR
        • 0x15501:$msg: Execute ERROR
        • 0x15a79:$ping: cmd.exe /c ping 0 -n 2 & del
        Process Memory Space: server.exe PID: 7596JoeSecurity_NjratYara detected NjratJoe Security
          SourceRuleDescriptionAuthorStrings
          0.0.server.exe.dc0000.0.unpackJoeSecurity_NjratYara detected NjratJoe Security
            0.0.server.exe.dc0000.0.unpackWindows_Trojan_Njrat_30f3c220unknownunknown
            • 0x115d2:$a1: get_Registry
            • 0x15a27:$a2: SEE_MASK_NOZONECHECKS
            • 0x156c9:$a3: Download ERROR
            • 0x15c79:$a4: cmd.exe /c ping 0 -n 2 & del "
            • 0x13c06:$a5: netsh firewall delete allowedprogram "
            0.0.server.exe.dc0000.0.unpackCN_disclosed_20180208_cDetects malware from disclosed CN malware setFlorian Roth
            • 0x15c79:$x1: cmd.exe /c ping 0 -n 2 & del "
            • 0x13792:$s1: winmgmts:\\.\root\SecurityCenter2
            • 0x156e7:$s3: Executed As
            • 0x124f0:$s5: Stub.exe
            • 0x156c9:$s6: Download ERROR
            • 0x13754:$s8: Select * From AntiVirusProduct
            0.0.server.exe.dc0000.0.unpackcrimeware_njrat_stringsDetects njRAT based on some stringsSekoia.io
            • 0x1546b:$: set cdaudio door closed
            • 0x1542f:$: set cdaudio door open
            • 0x15c8f:$: ping 0
            • 0x13412:$: [endof]
            • 0x132cc:$: TiGeR-Firewall
            • 0x132fa:$: NetSnifferCs
            • 0x132b8:$: IPBlocker
            • 0x13314:$: Sandboxie Control
            0.0.server.exe.dc0000.0.unpackNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
            • 0x15a27:$reg: SEE_MASK_NOZONECHECKS
            • 0x156ad:$msg: Execute ERROR
            • 0x15701:$msg: Execute ERROR
            • 0x15c79:$ping: cmd.exe /c ping 0 -n 2 & del
            Click to see the 1 entries

            System Summary

            barindex
            Source: Network ConnectionAuthor: Florian Roth (Nextron Systems): Data: DestinationIp: 77.90.22.45, DestinationIsIpv6: false, DestinationPort: 5552, EventID: 3, Image: C:\Users\user\Desktop\server.exe, Initiated: true, ProcessId: 7596, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49730
            Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Users\user\Desktop\server.exe, ProcessId: 7596, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-06T12:39:59.703675+010020211761Malware Command and Control Activity Detected192.168.2.44973077.90.22.455552TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-06T12:39:59.703675+010020331321Malware Command and Control Activity Detected192.168.2.44973077.90.22.455552TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-06T12:40:05.918199+010028255641Malware Command and Control Activity Detected192.168.2.44973077.90.22.455552TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: server.exeAvira: detected
            Source: C:\Program Files (x86)\Explower.exeAvira: detection malicious, Label: TR/Dropper.Gen
            Source: C:\Program Files (x86)\Explower.exeAvira: detection malicious, Label: TR/Dropper.Gen
            Source: C:\Program Files (x86)\Explower.exeAvira: detection malicious, Label: TR/Dropper.Gen
            Source: C:\Program Files (x86)\Explower.exeAvira: detection malicious, Label: TR/Dropper.Gen
            Source: C:\Program Files (x86)\Explower.exeAvira: detection malicious, Label: TR/Dropper.Gen
            Source: C:\Program Files (x86)\Explower.exeAvira: detection malicious, Label: TR/Dropper.Gen
            Source: C:\Program Files (x86)\Explower.exeAvira: detection malicious, Label: TR/Dropper.Gen
            Source: C:\Program Files (x86)\Explower.exeAvira: detection malicious, Label: TR/Dropper.Gen
            Source: C:\Program Files (x86)\Explower.exeAvira: detection malicious, Label: TR/Dropper.Gen
            Source: 0.0.server.exe.dc0000.0.unpackMalware Configuration Extractor: Njrat {"Campaign ID": "HacKed", "Version": "0.7d", "Install Name": "dc81ba2078dcc6e9b83f78a887be4629", "Install Dir": "Adobe Update", "Registry Value": "Software\\Microsoft\\Windows\\CurrentVersion\\Run", "Network Seprator": "|'|'|"}
            Source: C:\Program Files (x86)\Explower.exeReversingLabs: Detection: 84%
            Source: C:\Program Files (x86)\Explower.exeVirustotal: Detection: 72%Perma Link
            Source: C:\Users\user\AppData\Local\Explower.exeReversingLabs: Detection: 84%
            Source: C:\Users\user\AppData\Local\Explower.exeVirustotal: Detection: 72%Perma Link
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\History\Explower.exeReversingLabs: Detection: 84%
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\History\Explower.exeVirustotal: Detection: 72%Perma Link
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Explower.exeReversingLabs: Detection: 84%
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\Explower.exeReversingLabs: Detection: 84%
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeReversingLabs: Detection: 84%
            Source: C:\Users\user\Documents\Explower.exeReversingLabs: Detection: 84%
            Source: C:\Users\user\Favorites\Explower.exeReversingLabs: Detection: 84%
            Source: C:\Windows\SysWOW64\Explower.exeReversingLabs: Detection: 84%
            Source: server.exeVirustotal: Detection: 72%Perma Link
            Source: server.exeReversingLabs: Detection: 84%
            Source: Yara matchFile source: server.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.server.exe.dc0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.1656549731.0000000000DC2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: server.exe PID: 7596, type: MEMORYSTR
            Source: Yara matchFile source: C:\Program Files (x86)\Explower.exe, type: DROPPED
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: C:\Program Files (x86)\Explower.exeJoe Sandbox ML: detected
            Source: C:\Program Files (x86)\Explower.exeJoe Sandbox ML: detected
            Source: C:\Program Files (x86)\Explower.exeJoe Sandbox ML: detected
            Source: C:\Program Files (x86)\Explower.exeJoe Sandbox ML: detected
            Source: C:\Program Files (x86)\Explower.exeJoe Sandbox ML: detected
            Source: C:\Program Files (x86)\Explower.exeJoe Sandbox ML: detected
            Source: C:\Program Files (x86)\Explower.exeJoe Sandbox ML: detected
            Source: C:\Program Files (x86)\Explower.exeJoe Sandbox ML: detected
            Source: C:\Program Files (x86)\Explower.exeJoe Sandbox ML: detected
            Source: server.exeJoe Sandbox ML: detected
            Source: server.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: C:\Users\user\Desktop\server.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
            Source: server.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Spreading

            barindex
            Source: server.exe, Usb1.cs.Net Code: infect
            Source: Explower.exe.0.dr, Usb1.cs.Net Code: infect
            Source: Explower.exe0.0.dr, Usb1.cs.Net Code: infect
            Source: Explower.exe1.0.dr, Usb1.cs.Net Code: infect
            Source: Explower.exe2.0.dr, Usb1.cs.Net Code: infect
            Source: Explower.exe3.0.dr, Usb1.cs.Net Code: infect
            Source: Explower.exe4.0.dr, Usb1.cs.Net Code: infect
            Source: Explower.exe5.0.dr, Usb1.cs.Net Code: infect
            Source: Explower.exe6.0.dr, Usb1.cs.Net Code: infect
            Source: Explower.exe7.0.dr, Usb1.cs.Net Code: infect
            Source: server.exe, 00000000.00000000.1656549731.0000000000DC2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: \autorun.inf
            Source: server.exe, 00000000.00000000.1656549731.0000000000DC2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: [autorun]
            Source: server.exe, 00000000.00000000.1656549731.0000000000DC2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: autorun.inf
            Source: server.exeBinary or memory string: \autorun.inf
            Source: server.exeBinary or memory string: [autorun]
            Source: server.exeBinary or memory string: autorun.inf
            Source: Explower.exe2.0.drBinary or memory string: \autorun.inf
            Source: Explower.exe2.0.drBinary or memory string: [autorun]
            Source: Explower.exe2.0.drBinary or memory string: autorun.inf
            Source: Explower.exe.0.drBinary or memory string: \autorun.inf
            Source: Explower.exe.0.drBinary or memory string: [autorun]
            Source: Explower.exe.0.drBinary or memory string: autorun.inf
            Source: Explower.exe1.0.drBinary or memory string: \autorun.inf
            Source: Explower.exe1.0.drBinary or memory string: [autorun]
            Source: Explower.exe1.0.drBinary or memory string: autorun.inf
            Source: Explower.exe4.0.drBinary or memory string: \autorun.inf
            Source: Explower.exe4.0.drBinary or memory string: [autorun]
            Source: Explower.exe4.0.drBinary or memory string: autorun.inf
            Source: Explower.exe3.0.drBinary or memory string: \autorun.inf
            Source: Explower.exe3.0.drBinary or memory string: [autorun]
            Source: Explower.exe3.0.drBinary or memory string: autorun.inf
            Source: Explower.exe7.0.drBinary or memory string: \autorun.inf
            Source: Explower.exe7.0.drBinary or memory string: [autorun]
            Source: Explower.exe7.0.drBinary or memory string: autorun.inf
            Source: Explower.exe6.0.drBinary or memory string: \autorun.inf
            Source: Explower.exe6.0.drBinary or memory string: [autorun]
            Source: Explower.exe6.0.drBinary or memory string: autorun.inf
            Source: Explower.exe0.0.drBinary or memory string: \autorun.inf
            Source: Explower.exe0.0.drBinary or memory string: [autorun]
            Source: Explower.exe0.0.drBinary or memory string: autorun.inf
            Source: Explower.exe5.0.drBinary or memory string: \autorun.inf
            Source: Explower.exe5.0.drBinary or memory string: [autorun]
            Source: Explower.exe5.0.drBinary or memory string: autorun.inf

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:49730 -> 77.90.22.45:5552
            Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:49730 -> 77.90.22.45:5552
            Source: Network trafficSuricata IDS: 2825564 - Severity 1 - ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act) : 192.168.2.4:49730 -> 77.90.22.45:5552
            Source: global trafficTCP traffic: 192.168.2.4:49730 -> 77.90.22.45:5552
            Source: Joe Sandbox ViewASN Name: ASGHOSTNETDE ASGHOSTNETDE
            Source: unknownTCP traffic detected without corresponding DNS query: 77.90.22.45
            Source: unknownTCP traffic detected without corresponding DNS query: 77.90.22.45
            Source: unknownTCP traffic detected without corresponding DNS query: 77.90.22.45
            Source: unknownTCP traffic detected without corresponding DNS query: 77.90.22.45
            Source: unknownTCP traffic detected without corresponding DNS query: 77.90.22.45
            Source: C:\Users\user\Desktop\server.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

            E-Banking Fraud

            barindex
            Source: Yara matchFile source: server.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.server.exe.dc0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.1656549731.0000000000DC2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: server.exe PID: 7596, type: MEMORYSTR
            Source: Yara matchFile source: C:\Program Files (x86)\Explower.exe, type: DROPPED

            System Summary

            barindex
            Source: server.exe, type: SAMPLEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
            Source: server.exe, type: SAMPLEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: server.exe, type: SAMPLEMatched rule: Detects njRAT based on some strings Author: Sekoia.io
            Source: server.exe, type: SAMPLEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: server.exe, type: SAMPLEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: 0.0.server.exe.dc0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
            Source: 0.0.server.exe.dc0000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: 0.0.server.exe.dc0000.0.unpack, type: UNPACKEDPEMatched rule: Detects njRAT based on some strings Author: Sekoia.io
            Source: 0.0.server.exe.dc0000.0.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 0.0.server.exe.dc0000.0.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: 00000000.00000000.1656549731.0000000000DC2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
            Source: 00000000.00000000.1656549731.0000000000DC2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects njRAT based on some strings Author: Sekoia.io
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Users\user\Desktop\server.exeProcess Stats: CPU usage > 49%
            Source: C:\Users\user\Desktop\server.exeFile created: C:\Windows\SysWOW64\Explower.exeJump to behavior
            Source: C:\Users\user\Desktop\server.exeFile created: C:\Windows\SysWOW64\Explower.exe:Zone.Identifier:$DATAJump to behavior
            Source: C:\Users\user\Desktop\server.exeCode function: 0_2_055942980_2_05594298
            Source: C:\Users\user\Desktop\server.exeCode function: 0_2_055942690_2_05594269
            Source: server.exe, 00000000.00000002.4102476110.00000000011EE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs server.exe
            Source: server.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: server.exe, type: SAMPLEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
            Source: server.exe, type: SAMPLEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: server.exe, type: SAMPLEMatched rule: crimeware_njrat_strings author = Sekoia.io, description = Detects njRAT based on some strings, creation_date = 2022-08-22, classification = TLP:CLEAR, version = 1.0, id = 215807ae-fbcb-478d-8941-e0787b883669
            Source: server.exe, type: SAMPLEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: server.exe, type: SAMPLEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: 0.0.server.exe.dc0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
            Source: 0.0.server.exe.dc0000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.0.server.exe.dc0000.0.unpack, type: UNPACKEDPEMatched rule: crimeware_njrat_strings author = Sekoia.io, description = Detects njRAT based on some strings, creation_date = 2022-08-22, classification = TLP:CLEAR, version = 1.0, id = 215807ae-fbcb-478d-8941-e0787b883669
            Source: 0.0.server.exe.dc0000.0.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 0.0.server.exe.dc0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: 00000000.00000000.1656549731.0000000000DC2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
            Source: 00000000.00000000.1656549731.0000000000DC2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: crimeware_njrat_strings author = Sekoia.io, description = Detects njRAT based on some strings, creation_date = 2022-08-22, classification = TLP:CLEAR, version = 1.0, id = 215807ae-fbcb-478d-8941-e0787b883669
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: classification engineClassification label: mal100.spre.phis.troj.adwa.evad.winEXE@4/20@0/1
            Source: C:\Users\user\Desktop\server.exeCode function: 0_2_056C250A AdjustTokenPrivileges,0_2_056C250A
            Source: C:\Users\user\Desktop\server.exeCode function: 0_2_056C24D3 AdjustTokenPrivileges,0_2_056C24D3
            Source: C:\Users\user\Desktop\server.exeFile created: C:\Program Files (x86)\Explower.exeJump to behavior
            Source: C:\Users\user\Desktop\server.exeFile created: C:\Users\user\AppData\Roaming\appJump to behavior
            Source: C:\Users\user\Desktop\server.exeMutant created: NULL
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7684:120:WilError_03
            Source: C:\Users\user\Desktop\server.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
            Source: C:\Users\user\Desktop\server.exeMutant created: \Sessions\1\BaseNamedObjects\dc81ba2078dcc6e9b83f78a887be4629
            Source: C:\Users\user\Desktop\server.exeFile created: C:\Users\user\AppData\Local\Temp\FransescoPast.txtJump to behavior
            Source: server.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: server.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
            Source: C:\Users\user\Desktop\server.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: server.exeVirustotal: Detection: 72%
            Source: server.exeReversingLabs: Detection: 84%
            Source: C:\Users\user\Desktop\server.exeFile read: C:\Users\user\Desktop\server.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\server.exe "C:\Users\user\Desktop\server.exe"
            Source: C:\Users\user\Desktop\server.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\Desktop\server.exe" "server.exe" ENABLE
            Source: C:\Windows\SysWOW64\netsh.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\server.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\Desktop\server.exe" "server.exe" ENABLEJump to behavior
            Source: C:\Users\user\Desktop\server.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\server.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\server.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\server.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\server.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\server.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\server.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\server.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\server.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Users\user\Desktop\server.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\Desktop\server.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\server.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\server.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\server.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\server.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\server.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\server.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Users\user\Desktop\server.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\server.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ifmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasmontr.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mfc42u.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: authfwcfg.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpolicyiomgr.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: firewallapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcmonitor.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3cfg.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3api.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: onex.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappcfg.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappprxy.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwcfg.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: hnetmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netshell.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nlaapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netsetupapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netiohlp.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshhttp.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: httpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshipsec.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: activeds.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: polstore.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winipsec.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: adsldpc.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshwfp.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cabinet.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2pnetsh.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2p.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rpcnsh.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: whhelper.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlancfg.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlanapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wshelper.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wevtapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: peerdistsh.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wcmapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rmclient.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mobilenetworking.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: slc.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ktmw32.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprmsg.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\server.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{674B6698-EE92-11D0-AD71-00C04FD8FDFF}\InprocServer32Jump to behavior
            Source: C:\Users\user\Desktop\server.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dllJump to behavior
            Source: server.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: C:\Users\user\Desktop\server.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
            Source: server.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Data Obfuscation

            barindex
            Source: server.exe, Fransesco.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
            Source: Explower.exe.0.dr, Fransesco.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
            Source: Explower.exe0.0.dr, Fransesco.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
            Source: Explower.exe1.0.dr, Fransesco.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
            Source: Explower.exe2.0.dr, Fransesco.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
            Source: Explower.exe3.0.dr, Fransesco.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
            Source: Explower.exe4.0.dr, Fransesco.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
            Source: Explower.exe5.0.dr, Fransesco.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
            Source: Explower.exe6.0.dr, Fransesco.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
            Source: Explower.exe7.0.dr, Fransesco.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
            Source: C:\Users\user\Desktop\server.exeCode function: 0_2_016C05E0 push cs; ret 0_2_016C05E1
            Source: C:\Users\user\Desktop\server.exeCode function: 0_2_016C0710 push es; ret 0_2_016C0711

            Persistence and Installation Behavior

            barindex
            Source: C:\Users\user\Desktop\server.exeFile created: C:\Users\user\Documents\Explower.exeJump to dropped file
            Source: C:\Users\user\Desktop\server.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\Explower.exeJump to dropped file
            Source: C:\Users\user\Desktop\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeJump to dropped file
            Source: C:\Users\user\Desktop\server.exeFile created: C:\Windows\SysWOW64\Explower.exeJump to dropped file
            Source: C:\Users\user\Desktop\server.exeFile created: C:\Users\user\AppData\Local\Explower.exeJump to dropped file
            Source: C:\Users\user\Desktop\server.exeFile created: C:\Program Files (x86)\Explower.exeJump to dropped file
            Source: C:\Users\user\Desktop\server.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\History\Explower.exeJump to dropped file
            Source: C:\Users\user\Desktop\server.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Explower.exeJump to dropped file
            Source: C:\Users\user\Desktop\server.exeFile created: C:\Users\user\Documents\Explower.exeJump to dropped file
            Source: C:\Users\user\Desktop\server.exeFile created: C:\Users\user\Favorites\Explower.exeJump to dropped file
            Source: C:\Users\user\Desktop\server.exeFile created: C:\Program Files (x86)\Explower.exeJump to dropped file
            Source: C:\Users\user\Desktop\server.exeFile created: C:\Windows\SysWOW64\Explower.exeJump to dropped file

            Boot Survival

            barindex
            Source: C:\Users\user\Desktop\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeJump to dropped file
            Source: C:\Users\user\Desktop\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeJump to behavior
            Source: C:\Users\user\Desktop\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeJump to behavior
            Source: C:\Users\user\Desktop\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe\:Zone.Identifier:$DATAJump to behavior
            Source: C:\Users\user\Desktop\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\server.exeMemory allocated: 1770000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\server.exeMemory allocated: 3430000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\server.exeMemory allocated: 1770000 memory commit | memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\server.exeWindow / User API: threadDelayed 760Jump to behavior
            Source: C:\Users\user\Desktop\server.exeWindow / User API: threadDelayed 5811Jump to behavior
            Source: C:\Users\user\Desktop\server.exeWindow / User API: threadDelayed 2788Jump to behavior
            Source: C:\Users\user\Desktop\server.exeWindow / User API: foregroundWindowGot 747Jump to behavior
            Source: C:\Users\user\Desktop\server.exeWindow / User API: foregroundWindowGot 748Jump to behavior
            Source: C:\Users\user\Desktop\server.exe TID: 7620Thread sleep count: 760 > 30Jump to behavior
            Source: C:\Users\user\Desktop\server.exe TID: 7620Thread sleep time: -76000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\server.exe TID: 7600Thread sleep count: 5811 > 30Jump to behavior
            Source: C:\Users\user\Desktop\server.exe TID: 7600Thread sleep time: -5811000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\server.exe TID: 7600Thread sleep count: 2788 > 30Jump to behavior
            Source: C:\Users\user\Desktop\server.exe TID: 7600Thread sleep time: -2788000s >= -30000sJump to behavior
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: netsh.exe, 00000001.00000003.1686660010.0000000000992000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll[
            Source: server.exe, 00000000.00000002.4102476110.0000000001269000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWcessorArchitec
            Source: server.exe, 00000000.00000002.4102476110.0000000001269000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Users\user\Desktop\server.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\server.exeMemory allocated: page read and write | page guardJump to behavior
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 07:24:31 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 04:08:33 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 05:52:38 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/13 | 18:47:07 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 10:49:27 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 06:37:51 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 04:44:34 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/13 | 17:39:03 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 05:31:14 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 04:29:57 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 12:13:28 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 05:21:55 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 13:29:24 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 04:39:16 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 11:21:31 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 13:00:08 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/13 | 20:10:48 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 07:09:54 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/13 | 18:32:31 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 10:44:10 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 11:42:55 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 09:04:38 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 02:41:58 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 01:54:02 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 11:41:25 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 01:44:43 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 02:51:17 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 12:14:08 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 09:40:39 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 11:26:48 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 03:36:30 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 11:36:07 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 10:18:44 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 04:24:40 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 10:28:03 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 02:16:46 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/13 | 18:27:13 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/13 | 20:21:37 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 07:44:25 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 02:26:05 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 01:08:42 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 01:39:25 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 13:01:38 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 01:12:30 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 08:52:29 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 05:15:07 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 01:18:01 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 07:36:00 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/13 | 19:04:34 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 07:08:24 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 13:09:30 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 09:37:42 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 11:38:17 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 02:52:47 - Program Manager
            Source: server.exe, 00000000.00000002.4103150757.000000000375B000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4103150757.00000000037B9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 06:58:25 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 07:29:48 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 10:46:20 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 10:54:45 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 07:39:07 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 11:25:18 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/13 | 19:57:32 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 10:00:17 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 11:15:59 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 09:48:31 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 05:20:25 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 09:47:01 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 04:23:10 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 10:07:55 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 04:13:51 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 02:15:16 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 02:47:29 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 12:57:21 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 02:20:34 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 04:07:03 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 10:01:47 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 02:05:57 - Program Manager
            Source: server.exe, 00000000.00000002.4103150757.00000000034E1000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4103150757.000000000375B000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/09 | 02:29:54 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 05:05:48 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 04:55:23 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 01:07:12 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 08:53:59 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 09:36:12 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 01:55:32 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 10:43:56 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/13 | 16:46:52 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 01:11:39 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 08:49:32 - Program Manager
            Source: server.exe, 00000000.00000002.4103150757.00000000034E1000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4103150757.000000000375B000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/09 | 02:23:46 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 10:11:06 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 06:46:56 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 03:04:56 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/13 | 18:43:20 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 06:56:15 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 02:06:11 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/13 | 17:18:55 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 02:04:27 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 02:27:35 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/13 | 17:28:14 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 09:10:10 - Program Manager
            Source: server.exe, 00000000.00000002.4103150757.00000000034E1000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4103150757.000000000375B000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/08 | 23:44:08 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 09:00:51 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 04:53:39 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 05:38:52 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 05:48:11 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 09:20:45 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 11:32:20 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 10:53:15 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 12:20:30 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 09:30:04 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 13:18:35 - Program Manager
            Source: server.exe, 00000000.00000002.4103150757.00000000034E1000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4103150757.000000000375B000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 06:26:12 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 09:26:53 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 12:24:17 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 09:59:20 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 04:28:27 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 11:19:53 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 12:14:58 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 05:32:44 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 11:16:13 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 05:42:03 - Program Manager
            Source: server.exe, 00000000.00000002.4103150757.00000000034E1000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4103150757.000000000375B000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/09 | 02:33:42 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 02:43:42 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 11:20:01 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 03:24:11 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 06:40:48 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4103150757.000000000394E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 07:03:33 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 00:50:25 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 11:10:42 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 07:17:29 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 11:37:37 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 01:33:54 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 10:27:49 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 10:37:08 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 07:35:20 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 01:17:47 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 01:27:06 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 06:25:32 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 11:59:52 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 09:51:28 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 04:16:08 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/13 | 16:50:40 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 02:49:50 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 03:51:46 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 05:28:56 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 09:40:00 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 05:11:20 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 04:32:15 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 05:38:15 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 06:09:25 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 10:45:40 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 04:22:56 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/13 | 17:56:40 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 03:57:54 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 06:03:17 - Program Manager
            Source: server.exe, 00000000.00000002.4103150757.00000000034E1000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4103150757.000000000375B000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 05:59:26 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 05:40:19 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/13 | 18:48:37 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 03:44:05 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 11:47:33 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 09:09:16 - Program Manager
            Source: server.exe, 00000000.00000002.4103150757.00000000034E1000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4103150757.000000000375B000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/08 | 21:51:28 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/13 | 19:35:54 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 04:52:09 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 07:03:46 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 05:49:04 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 08:10:07 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/13 | 19:45:13 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 07:13:05 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 05:39:45 - Program Manager
            Source: server.exe, 00000000.00000002.4103150757.00000000034E1000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4103150757.000000000375B000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 06:36:47 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 01:02:34 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 09:11:40 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 03:46:28 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 09:07:02 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 03:31:52 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4103150757.000000000394E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 07:02:03 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 12:19:36 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 10:02:01 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 12:17:22 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 05:54:22 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 10:23:25 - Program Manager
            Source: server.exe, 00000000.00000002.4103150757.00000000034E1000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4103150757.000000000375B000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 06:48:29 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 08:37:13 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 04:02:25 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 09:35:58 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 09:45:17 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 10:21:02 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 05:10:29 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 10:11:43 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 06:57:08 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 04:03:55 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 06:05:01 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 06:47:49 - Program Manager
            Source: server.exe, 00000000.00000002.4103150757.00000000034E1000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4103150757.000000000375B000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 06:43:12 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 07:01:23 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 04:05:19 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 08:55:43 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 01:01:04 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 05:26:33 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 07:50:36 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 08:42:31 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 06:42:32 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 09:58:29 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/13 | 20:18:03 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 06:15:36 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 03:33:16 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 07:19:50 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 07:05:56 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 02:58:55 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 11:52:51 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 07:02:53 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 09:44:33 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 05:41:10 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 11:28:32 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 06:58:38 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 03:41:11 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 12:36:36 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 03:42:41 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 12:35:06 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 08:39:23 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 00:36:02 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/13 | 16:36:56 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 01:34:47 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 10:43:19 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 11:59:02 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 02:26:42 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 02:36:01 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 10:22:32 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 03:34:46 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 06:34:37 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 09:59:59 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 12:27:31 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 03:50:16 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 01:32:24 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 11:30:36 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/13 | 19:38:31 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 09:15:27 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 02:42:12 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 01:08:05 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 11:51:21 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 03:40:57 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/13 | 18:41:36 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 11:32:59 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 04:50:45 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 03:52:00 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 12:25:47 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/13 | 17:35:55 - Program Manager
            Source: server.exe, 00000000.00000002.4103150757.00000000034E1000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4103150757.000000000375B000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 06:27:42 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/13 | 20:43:52 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 03:25:41 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 06:02:24 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 13:23:53 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 11:17:43 - Program Manager
            Source: server.exe, 00000000.00000002.4103150757.00000000034E1000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4103150757.000000000375B000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 06:52:17 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 08:41:01 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 02:15:53 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 09:41:30 - Program Manager
            Source: server.exe, 00000000.00000002.4103150757.00000000034E1000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4103150757.000000000375B000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 06:00:10 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 04:43:04 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 05:41:49 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 06:14:06 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 05:51:08 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 10:30:07 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/13 | 17:41:07 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 07:37:30 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 11:01:00 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 10:20:48 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/13 | 16:23:44 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 10:08:35 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 09:13:04 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 12:01:09 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 06:36:21 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 01:59:56 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 06:53:21 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/13 | 18:00:57 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 06:30:50 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 08:48:02 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 05:11:59 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/13 | 18:10:16 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 06:06:31 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 09:46:47 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 04:13:14 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 05:06:02 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 08:54:13 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/13 | 18:12:00 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 05:35:38 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 09:52:58 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 01:10:09 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/13 | 19:10:45 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/13 | 19:20:04 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 09:54:42 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 05:00:31 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 07:45:05 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 11:56:38 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 12:05:40 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 10:24:55 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 10:48:34 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 10:34:14 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/13 | 20:04:37 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 02:16:09 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 07:14:35 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 08:53:09 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 02:40:28 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 03:03:26 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 06:49:33 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 07:28:55 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 08:22:39 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 01:16:54 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 04:32:52 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 03:11:38 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 05:28:19 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 08:44:17 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 10:37:45 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 02:24:58 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 11:23:54 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 04:41:40 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 01:47:37 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 02:33:46 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 09:22:09 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 09:29:30 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 04:56:16 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 05:04:55 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 09:00:14 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 01:25:42 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 06:12:59 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 11:09:48 - Program Manager
            Source: server.exe, 00000000.00000002.4103150757.00000000034E1000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4103150757.000000000375B000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/06 | 06:40:07 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 13:27:01 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 10:51:51 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 12:31:58 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 05:24:49 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 11:40:32 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/13 | 21:09:44 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 08:50:06 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/13 | 17:56:03 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 01:42:20 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 09:12:59 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 07:42:02 - Program Manager
            Source: server.exe, 00000000.00000002.4103150757.000000000375B000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4103150757.00000000037B9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 06:57:32 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 11:53:07 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/13 | 21:13:32 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 03:08:41 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 11:04:31 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 02:23:28 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 04:16:45 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 04:52:46 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 13:25:00 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 05:02:54 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 10:09:02 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 06:31:06 - Program Manager
            Source: server.exe, 00000000.00000002.4103150757.00000000034E1000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4103150757.000000000375B000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/06 | 06:41:37 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 00:58:56 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 12:38:20 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 11:17:06 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 01:50:54 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 05:23:02 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 11:25:55 - Program Manager
            Source: server.exe, Explower.exe2.0.dr, Explower.exe.0.dr, Explower.exe1.0.dr, Explower.exe4.0.dr, Explower.exe3.0.dr, Explower.exe7.0.dr, Explower.exe6.0.dr, Explower.exe0.0.dr, Explower.exe5.0.drBinary or memory string: Shell_traywnd+MostrarBarraDeTarefas
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/13 | 16:11:25 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 01:58:26 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 01:31:31 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 06:56:52 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 09:20:08 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/13 | 18:36:55 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 06:10:58 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 05:39:08 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 09:55:13 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 04:48:58 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 01:15:24 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 09:33:07 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 07:47:02 - Program Manager
            Source: server.exe, 00000000.00000002.4103150757.00000000034E1000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4103150757.000000000375B000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/08 | 15:25:30 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 12:01:46 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 08:55:06 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 11:49:19 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 04:59:47 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 10:10:50 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 07:26:04 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/13 | 17:09:13 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/13 | 20:46:46 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 02:30:30 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 12:28:02 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 02:29:58 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 03:49:59 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 07:21:54 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/13 | 16:37:49 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 01:20:42 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 06:23:48 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 11:13:45 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 10:41:33 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 03:02:33 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 06:39:15 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 08:57:07 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 09:41:56 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 07:49:03 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 05:15:44 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 09:53:12 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 11:08:01 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 13:20:39 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 03:44:42 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 06:03:54 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 12:34:50 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 03:57:17 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 09:18:41 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/13 | 18:19:01 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 12:16:05 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/13 | 21:11:31 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 07:11:58 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 12:08:47 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 02:49:13 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/13 | 21:01:35 - Program Manager
            Source: server.exe, 00000000.00000002.4103150757.00000000034E1000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4103150757.000000000375B000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 06:50:31 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 10:45:03 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 07:03:09 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 02:14:23 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 01:27:43 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 06:48:03 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 07:51:07 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 03:00:49 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 03:00:32 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 07:56:31 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 11:02:47 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 02:35:47 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 07:25:24 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 07:06:01 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/13 | 20:03:07 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 06:17:20 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 04:54:30 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 01:25:59 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 10:52:31 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 07:09:17 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 05:32:07 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 04:30:51 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 11:16:50 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 09:49:24 - Program Manager
            Source: server.exe, 00000000.00000002.4103150757.00000000034E1000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4103150757.000000000375B000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 06:24:28 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 10:53:52 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 04:24:03 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 03:59:01 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 12:24:54 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 09:42:23 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 13:08:39 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 12:19:45 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 02:57:25 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 05:18:21 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 04:21:26 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 10:25:48 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 06:50:44 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 06:14:43 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 08:56:14 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 01:49:21 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 07:00:52 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 02:56:54 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 04:06:49 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 08:46:01 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 01:48:50 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 01:23:58 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 09:54:05 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 13:23:16 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 10:31:24 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 05:58:46 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 12:03:30 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 12:15:12 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 09:28:17 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 02:17:00 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 13:11:34 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/13 | 21:11:48 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 11:47:42 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 07:35:09 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 03:13:22 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 11:59:15 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 11:39:21 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 07:48:10 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 10:20:31 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/13 | 18:02:58 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 01:05:28 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 10:57:00 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 06:07:02 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 10:30:44 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 02:34:54 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 09:23:00 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 09:09:03 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 01:26:50 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 11:14:29 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 09:53:29 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 02:02:26 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 09:07:15 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 13:30:57 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 03:23:40 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 07:02:16 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 08:45:25 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 02:58:18 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 02:37:31 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 01:04:35 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 09:08:23 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 13:07:46 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 10:28:40 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 06:41:02 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 11:36:44 - Program Manager
            Source: server.exe, 00000000.00000002.4104572487.0000000004431000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000000.00000002.4104572487.0000000004E31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/16 | 04:31:44 - Program Manager
            Source: C:\Windows\SysWOW64\netsh.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\server.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Lowering of HIPS / PFW / Operating System Security Settings

            barindex
            Source: server.exe, Fransesco.cs.Net Code: INS
            Source: Explower.exe.0.dr, Fransesco.cs.Net Code: INS
            Source: Explower.exe0.0.dr, Fransesco.cs.Net Code: INS
            Source: Explower.exe1.0.dr, Fransesco.cs.Net Code: INS
            Source: Explower.exe2.0.dr, Fransesco.cs.Net Code: INS
            Source: Explower.exe3.0.dr, Fransesco.cs.Net Code: INS
            Source: Explower.exe4.0.dr, Fransesco.cs.Net Code: INS
            Source: Explower.exe5.0.dr, Fransesco.cs.Net Code: INS
            Source: Explower.exe6.0.dr, Fransesco.cs.Net Code: INS
            Source: Explower.exe7.0.dr, Fransesco.cs.Net Code: INS
            Source: C:\Users\user\Desktop\server.exeRegistry value created: HKEY_CURRENT_USER\Environment SEE_MASK_NOZONECHECKSJump to behavior
            Source: C:\Users\user\Desktop\server.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\Desktop\server.exe" "server.exe" ENABLE
            Source: C:\Users\user\Desktop\server.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\Desktop\server.exe" "server.exe" ENABLE

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: server.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.server.exe.dc0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.1656549731.0000000000DC2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: server.exe PID: 7596, type: MEMORYSTR
            Source: Yara matchFile source: C:\Program Files (x86)\Explower.exe, type: DROPPED

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: server.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.server.exe.dc0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.1656549731.0000000000DC2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: server.exe PID: 7596, type: MEMORYSTR
            Source: Yara matchFile source: C:\Program Files (x86)\Explower.exe, type: DROPPED
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire Infrastructure11
            Replication Through Removable Media
            Windows Management Instrumentation12
            Registry Run Keys / Startup Folder
            1
            Access Token Manipulation
            32
            Masquerading
            OS Credential Dumping11
            Security Software Discovery
            Remote Services1
            Archive Collected Data
            1
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/Job1
            DLL Side-Loading
            2
            Process Injection
            2
            Virtualization/Sandbox Evasion
            LSASS Memory2
            Virtualization/Sandbox Evasion
            Remote Desktop Protocol1
            Clipboard Data
            1
            Non-Standard Port
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)12
            Registry Run Keys / Startup Folder
            41
            Disable or Modify Tools
            Security Account Manager1
            Process Discovery
            SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
            DLL Side-Loading
            1
            Access Token Manipulation
            NTDS1
            Application Window Discovery
            Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
            Process Injection
            LSA Secrets1
            Peripheral Device Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            Obfuscated Files or Information
            Cached Domain Credentials12
            System Information Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            Software Packing
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
            DLL Side-Loading
            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            server.exe72%VirustotalBrowse
            server.exe84%ReversingLabsByteCode-MSIL.Backdoor.njRAT
            server.exe100%AviraTR/Dropper.Gen
            server.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Program Files (x86)\Explower.exe100%AviraTR/Dropper.Gen
            C:\Program Files (x86)\Explower.exe100%AviraTR/Dropper.Gen
            C:\Program Files (x86)\Explower.exe100%AviraTR/Dropper.Gen
            C:\Program Files (x86)\Explower.exe100%AviraTR/Dropper.Gen
            C:\Program Files (x86)\Explower.exe100%AviraTR/Dropper.Gen
            C:\Program Files (x86)\Explower.exe100%AviraTR/Dropper.Gen
            C:\Program Files (x86)\Explower.exe100%AviraTR/Dropper.Gen
            C:\Program Files (x86)\Explower.exe100%AviraTR/Dropper.Gen
            C:\Program Files (x86)\Explower.exe100%AviraTR/Dropper.Gen
            C:\Program Files (x86)\Explower.exe100%Joe Sandbox ML
            C:\Program Files (x86)\Explower.exe100%Joe Sandbox ML
            C:\Program Files (x86)\Explower.exe100%Joe Sandbox ML
            C:\Program Files (x86)\Explower.exe100%Joe Sandbox ML
            C:\Program Files (x86)\Explower.exe100%Joe Sandbox ML
            C:\Program Files (x86)\Explower.exe100%Joe Sandbox ML
            C:\Program Files (x86)\Explower.exe100%Joe Sandbox ML
            C:\Program Files (x86)\Explower.exe100%Joe Sandbox ML
            C:\Program Files (x86)\Explower.exe100%Joe Sandbox ML
            C:\Program Files (x86)\Explower.exe84%ReversingLabsByteCode-MSIL.Backdoor.njRAT
            C:\Program Files (x86)\Explower.exe72%VirustotalBrowse
            C:\Users\user\AppData\Local\Explower.exe84%ReversingLabsByteCode-MSIL.Backdoor.njRAT
            C:\Users\user\AppData\Local\Explower.exe72%VirustotalBrowse
            C:\Users\user\AppData\Local\Microsoft\Windows\History\Explower.exe84%ReversingLabsByteCode-MSIL.Backdoor.njRAT
            C:\Users\user\AppData\Local\Microsoft\Windows\History\Explower.exe72%VirustotalBrowse
            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Explower.exe84%ReversingLabsByteCode-MSIL.Backdoor.njRAT
            C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\Explower.exe84%ReversingLabsByteCode-MSIL.Backdoor.njRAT
            C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe84%ReversingLabsByteCode-MSIL.Backdoor.njRAT
            C:\Users\user\Documents\Explower.exe84%ReversingLabsByteCode-MSIL.Backdoor.njRAT
            C:\Users\user\Favorites\Explower.exe84%ReversingLabsByteCode-MSIL.Backdoor.njRAT
            C:\Windows\SysWOW64\Explower.exe84%ReversingLabsByteCode-MSIL.Backdoor.njRAT
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            No contacted domains info
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            77.90.22.45
            unknownGermany
            12586ASGHOSTNETDEtrue
            Joe Sandbox version:41.0.0 Charoite
            Analysis ID:1584742
            Start date and time:2025-01-06 12:39:04 +01:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 7m 46s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:7
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:server.exe
            Detection:MAL
            Classification:mal100.spre.phis.troj.adwa.evad.winEXE@4/20@0/1
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:
            • Successful, ratio: 99%
            • Number of executed functions: 106
            • Number of non-executed functions: 0
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Override analysis time to 240s for sample files taking high CPU consumption
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
            • Excluded IPs from analysis (whitelisted): 4.175.87.197, 20.109.210.53, 13.107.246.45
            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtQueryValueKey calls found.
            TimeTypeDescription
            06:40:28API Interceptor562644x Sleep call for process: server.exe modified
            11:39:59AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe
            No context
            No context
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            ASGHOSTNETDEFantazy.i486.elfGet hashmaliciousUnknownBrowse
            • 77.90.25.227
            armv5l.elfGet hashmaliciousUnknownBrowse
            • 5.231.4.240
            mipsel.elfGet hashmaliciousUnknownBrowse
            • 5.231.4.240
            powerpc.elfGet hashmaliciousUnknownBrowse
            • 5.231.4.240
            mips.elfGet hashmaliciousUnknownBrowse
            • 5.231.4.240
            sparc.elfGet hashmaliciousUnknownBrowse
            • 5.230.251.14
            arm.nn.elfGet hashmaliciousMirai, OkiruBrowse
            • 5.230.157.188
            armv4l.elfGet hashmaliciousUnknownBrowse
            • 5.231.4.240
            armv7l.elfGet hashmaliciousUnknownBrowse
            • 5.230.33.236
            i686.elfGet hashmaliciousUnknownBrowse
            • 5.230.33.236
            No context
            No context
            Process:C:\Users\user\Desktop\server.exe
            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
            Category:dropped
            Size (bytes):95232
            Entropy (8bit):5.559943444120193
            Encrypted:false
            SSDEEP:768:LY3oxnD9O/pBcxYsbae6GIXb9pDX2t9zPL0OXLeuXxrjEtCdnl2pi1Rz4Rk3usG1:hxxOx6baIa9ROj00ljEwzGi1dDKDJgS
            MD5:E4B99200FB42EE229FBB41F2CF56D8F8
            SHA1:EDF6652F563FDC69788FB9C4E8B9499C412095FD
            SHA-256:ADAE7B74DB9B2C08ABCC5F6B0165896726A36EB412E780710E242A97B12554F9
            SHA-512:0A7F68FA37F55242E3D5E8B385A0EEFDF971C5F196E20B34F931D339220E31A224769827129AAB0444CDAD4F7BE78014DC9347749E90A6EC563074ABE130DCB5
            Malicious:true
            Yara Hits:
            • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Program Files (x86)\Explower.exe, Author: Joe Security
            • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\Program Files (x86)\Explower.exe, Author: unknown
            • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: C:\Program Files (x86)\Explower.exe, Author: Florian Roth
            • Rule: crimeware_njrat_strings, Description: Detects njRAT based on some strings, Source: C:\Program Files (x86)\Explower.exe, Author: Sekoia.io
            • Rule: Njrat, Description: detect njRAT in memory, Source: C:\Program Files (x86)\Explower.exe, Author: JPCERT/CC Incident Response Group
            • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
            • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
            • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
            • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
            • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
            • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
            • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
            • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
            • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
            • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
            • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
            • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
            • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
            • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
            • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
            • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
            • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
            • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
            • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
            • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
            • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
            • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
            • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
            • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
            • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
            • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
            • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
            • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
            • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
            • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
            • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
            • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
            • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
            • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
            • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
            • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
            • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
            • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
            • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
            • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
            • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
            • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
            • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
            • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
            • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
            • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
            • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
            • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
            • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
            Antivirus:
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            • Antivirus: ReversingLabs, Detection: 84%
            • Antivirus: Virustotal, Detection: 72%, Browse
            Reputation:low
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...&.{g.................p............... ........@.. ....................................@.....................................S.................................................................................... ............... ..H............text....o... ...p.................. ..`.reloc...............r..............@..B................................................................H.......................................................................&.(......**..(......*.s.........s ........s!........s".........*.0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
            Process:C:\Users\user\Desktop\server.exe
            File Type:ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):26
            Entropy (8bit):3.95006375643621
            Encrypted:false
            SSDEEP:3:ggPYV:rPYV
            MD5:187F488E27DB4AF347237FE461A079AD
            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
            Malicious:true
            Reputation:high, very likely benign file
            Preview:[ZoneTransfer]....ZoneId=0
            Process:C:\Users\user\Desktop\server.exe
            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
            Category:dropped
            Size (bytes):95232
            Entropy (8bit):5.559943444120193
            Encrypted:false
            SSDEEP:768:LY3oxnD9O/pBcxYsbae6GIXb9pDX2t9zPL0OXLeuXxrjEtCdnl2pi1Rz4Rk3usG1:hxxOx6baIa9ROj00ljEwzGi1dDKDJgS
            MD5:E4B99200FB42EE229FBB41F2CF56D8F8
            SHA1:EDF6652F563FDC69788FB9C4E8B9499C412095FD
            SHA-256:ADAE7B74DB9B2C08ABCC5F6B0165896726A36EB412E780710E242A97B12554F9
            SHA-512:0A7F68FA37F55242E3D5E8B385A0EEFDF971C5F196E20B34F931D339220E31A224769827129AAB0444CDAD4F7BE78014DC9347749E90A6EC563074ABE130DCB5
            Malicious:true
            Antivirus:
            • Antivirus: ReversingLabs, Detection: 84%
            • Antivirus: Virustotal, Detection: 72%, Browse
            Reputation:low
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...&.{g.................p............... ........@.. ....................................@.....................................S.................................................................................... ............... ..H............text....o... ...p.................. ..`.reloc...............r..............@..B................................................................H.......................................................................&.(......**..(......*.s.........s ........s!........s".........*.0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
            Process:C:\Users\user\Desktop\server.exe
            File Type:ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):26
            Entropy (8bit):3.95006375643621
            Encrypted:false
            SSDEEP:3:ggPYV:rPYV
            MD5:187F488E27DB4AF347237FE461A079AD
            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
            Malicious:false
            Reputation:high, very likely benign file
            Preview:[ZoneTransfer]....ZoneId=0
            Process:C:\Users\user\Desktop\server.exe
            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
            Category:dropped
            Size (bytes):95232
            Entropy (8bit):5.559943444120193
            Encrypted:false
            SSDEEP:768:LY3oxnD9O/pBcxYsbae6GIXb9pDX2t9zPL0OXLeuXxrjEtCdnl2pi1Rz4Rk3usG1:hxxOx6baIa9ROj00ljEwzGi1dDKDJgS
            MD5:E4B99200FB42EE229FBB41F2CF56D8F8
            SHA1:EDF6652F563FDC69788FB9C4E8B9499C412095FD
            SHA-256:ADAE7B74DB9B2C08ABCC5F6B0165896726A36EB412E780710E242A97B12554F9
            SHA-512:0A7F68FA37F55242E3D5E8B385A0EEFDF971C5F196E20B34F931D339220E31A224769827129AAB0444CDAD4F7BE78014DC9347749E90A6EC563074ABE130DCB5
            Malicious:true
            Antivirus:
            • Antivirus: ReversingLabs, Detection: 84%
            • Antivirus: Virustotal, Detection: 72%, Browse
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...&.{g.................p............... ........@.. ....................................@.....................................S.................................................................................... ............... ..H............text....o... ...p.................. ..`.reloc...............r..............@..B................................................................H.......................................................................&.(......**..(......*.s.........s ........s!........s".........*.0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
            Process:C:\Users\user\Desktop\server.exe
            File Type:ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):26
            Entropy (8bit):3.95006375643621
            Encrypted:false
            SSDEEP:3:ggPYV:rPYV
            MD5:187F488E27DB4AF347237FE461A079AD
            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
            Malicious:false
            Preview:[ZoneTransfer]....ZoneId=0
            Process:C:\Users\user\Desktop\server.exe
            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
            Category:dropped
            Size (bytes):95232
            Entropy (8bit):5.559943444120193
            Encrypted:false
            SSDEEP:768:LY3oxnD9O/pBcxYsbae6GIXb9pDX2t9zPL0OXLeuXxrjEtCdnl2pi1Rz4Rk3usG1:hxxOx6baIa9ROj00ljEwzGi1dDKDJgS
            MD5:E4B99200FB42EE229FBB41F2CF56D8F8
            SHA1:EDF6652F563FDC69788FB9C4E8B9499C412095FD
            SHA-256:ADAE7B74DB9B2C08ABCC5F6B0165896726A36EB412E780710E242A97B12554F9
            SHA-512:0A7F68FA37F55242E3D5E8B385A0EEFDF971C5F196E20B34F931D339220E31A224769827129AAB0444CDAD4F7BE78014DC9347749E90A6EC563074ABE130DCB5
            Malicious:true
            Antivirus:
            • Antivirus: ReversingLabs, Detection: 84%
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...&.{g.................p............... ........@.. ....................................@.....................................S.................................................................................... ............... ..H............text....o... ...p.................. ..`.reloc...............r..............@..B................................................................H.......................................................................&.(......**..(......*.s.........s ........s!........s".........*.0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
            Process:C:\Users\user\Desktop\server.exe
            File Type:ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):26
            Entropy (8bit):3.95006375643621
            Encrypted:false
            SSDEEP:3:ggPYV:rPYV
            MD5:187F488E27DB4AF347237FE461A079AD
            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
            Malicious:false
            Preview:[ZoneTransfer]....ZoneId=0
            Process:C:\Users\user\Desktop\server.exe
            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
            Category:dropped
            Size (bytes):95232
            Entropy (8bit):5.559943444120193
            Encrypted:false
            SSDEEP:768:LY3oxnD9O/pBcxYsbae6GIXb9pDX2t9zPL0OXLeuXxrjEtCdnl2pi1Rz4Rk3usG1:hxxOx6baIa9ROj00ljEwzGi1dDKDJgS
            MD5:E4B99200FB42EE229FBB41F2CF56D8F8
            SHA1:EDF6652F563FDC69788FB9C4E8B9499C412095FD
            SHA-256:ADAE7B74DB9B2C08ABCC5F6B0165896726A36EB412E780710E242A97B12554F9
            SHA-512:0A7F68FA37F55242E3D5E8B385A0EEFDF971C5F196E20B34F931D339220E31A224769827129AAB0444CDAD4F7BE78014DC9347749E90A6EC563074ABE130DCB5
            Malicious:true
            Antivirus:
            • Antivirus: ReversingLabs, Detection: 84%
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...&.{g.................p............... ........@.. ....................................@.....................................S.................................................................................... ............... ..H............text....o... ...p.................. ..`.reloc...............r..............@..B................................................................H.......................................................................&.(......**..(......*.s.........s ........s!........s".........*.0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
            Process:C:\Users\user\Desktop\server.exe
            File Type:ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):26
            Entropy (8bit):3.95006375643621
            Encrypted:false
            SSDEEP:3:ggPYV:rPYV
            MD5:187F488E27DB4AF347237FE461A079AD
            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
            Malicious:false
            Preview:[ZoneTransfer]....ZoneId=0
            Process:C:\Users\user\Desktop\server.exe
            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
            Category:dropped
            Size (bytes):95232
            Entropy (8bit):5.559943444120193
            Encrypted:false
            SSDEEP:768:LY3oxnD9O/pBcxYsbae6GIXb9pDX2t9zPL0OXLeuXxrjEtCdnl2pi1Rz4Rk3usG1:hxxOx6baIa9ROj00ljEwzGi1dDKDJgS
            MD5:E4B99200FB42EE229FBB41F2CF56D8F8
            SHA1:EDF6652F563FDC69788FB9C4E8B9499C412095FD
            SHA-256:ADAE7B74DB9B2C08ABCC5F6B0165896726A36EB412E780710E242A97B12554F9
            SHA-512:0A7F68FA37F55242E3D5E8B385A0EEFDF971C5F196E20B34F931D339220E31A224769827129AAB0444CDAD4F7BE78014DC9347749E90A6EC563074ABE130DCB5
            Malicious:true
            Antivirus:
            • Antivirus: ReversingLabs, Detection: 84%
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...&.{g.................p............... ........@.. ....................................@.....................................S.................................................................................... ............... ..H............text....o... ...p.................. ..`.reloc...............r..............@..B................................................................H.......................................................................&.(......**..(......*.s.........s ........s!........s".........*.0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
            Process:C:\Users\user\Desktop\server.exe
            File Type:ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):26
            Entropy (8bit):3.95006375643621
            Encrypted:false
            SSDEEP:3:ggPYV:rPYV
            MD5:187F488E27DB4AF347237FE461A079AD
            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
            Malicious:false
            Preview:[ZoneTransfer]....ZoneId=0
            Process:C:\Users\user\Desktop\server.exe
            File Type:Unicode text, UTF-8 (with BOM) text, with no line terminators
            Category:dropped
            Size (bytes):4
            Entropy (8bit):2.0
            Encrypted:false
            SSDEEP:3:W:W
            MD5:3EB8A6AFA534FADC147AA70DEA76E863
            SHA1:03B827D99098F69C9F126679598F7166C99D1624
            SHA-256:D3D1D98DF443947AB0B52378ACBB5F5C21593677B45F0403B3831C93D8BE7FCA
            SHA-512:B9D20E1F18DD2DC9A71E436E5C27854196F1F8F0ADFBF59AED9D70AB83B88C2C39958720508E87D98F8CB23DCB7BBAA81825406439EDCC07B6D2EE310ACD4327
            Malicious:false
            Preview:.6
            Process:C:\Users\user\Desktop\server.exe
            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
            Category:dropped
            Size (bytes):95232
            Entropy (8bit):5.559943444120193
            Encrypted:false
            SSDEEP:768:LY3oxnD9O/pBcxYsbae6GIXb9pDX2t9zPL0OXLeuXxrjEtCdnl2pi1Rz4Rk3usG1:hxxOx6baIa9ROj00ljEwzGi1dDKDJgS
            MD5:E4B99200FB42EE229FBB41F2CF56D8F8
            SHA1:EDF6652F563FDC69788FB9C4E8B9499C412095FD
            SHA-256:ADAE7B74DB9B2C08ABCC5F6B0165896726A36EB412E780710E242A97B12554F9
            SHA-512:0A7F68FA37F55242E3D5E8B385A0EEFDF971C5F196E20B34F931D339220E31A224769827129AAB0444CDAD4F7BE78014DC9347749E90A6EC563074ABE130DCB5
            Malicious:true
            Antivirus:
            • Antivirus: ReversingLabs, Detection: 84%
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...&.{g.................p............... ........@.. ....................................@.....................................S.................................................................................... ............... ..H............text....o... ...p.................. ..`.reloc...............r..............@..B................................................................H.......................................................................&.(......**..(......*.s.........s ........s!........s".........*.0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
            Process:C:\Users\user\Desktop\server.exe
            File Type:ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):26
            Entropy (8bit):3.95006375643621
            Encrypted:false
            SSDEEP:3:ggPYV:rPYV
            MD5:187F488E27DB4AF347237FE461A079AD
            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
            Malicious:false
            Preview:[ZoneTransfer]....ZoneId=0
            Process:C:\Users\user\Desktop\server.exe
            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
            Category:dropped
            Size (bytes):95232
            Entropy (8bit):5.559943444120193
            Encrypted:false
            SSDEEP:768:LY3oxnD9O/pBcxYsbae6GIXb9pDX2t9zPL0OXLeuXxrjEtCdnl2pi1Rz4Rk3usG1:hxxOx6baIa9ROj00ljEwzGi1dDKDJgS
            MD5:E4B99200FB42EE229FBB41F2CF56D8F8
            SHA1:EDF6652F563FDC69788FB9C4E8B9499C412095FD
            SHA-256:ADAE7B74DB9B2C08ABCC5F6B0165896726A36EB412E780710E242A97B12554F9
            SHA-512:0A7F68FA37F55242E3D5E8B385A0EEFDF971C5F196E20B34F931D339220E31A224769827129AAB0444CDAD4F7BE78014DC9347749E90A6EC563074ABE130DCB5
            Malicious:true
            Antivirus:
            • Antivirus: ReversingLabs, Detection: 84%
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...&.{g.................p............... ........@.. ....................................@.....................................S.................................................................................... ............... ..H............text....o... ...p.................. ..`.reloc...............r..............@..B................................................................H.......................................................................&.(......**..(......*.s.........s ........s!........s".........*.0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
            Process:C:\Users\user\Desktop\server.exe
            File Type:ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):26
            Entropy (8bit):3.95006375643621
            Encrypted:false
            SSDEEP:3:ggPYV:rPYV
            MD5:187F488E27DB4AF347237FE461A079AD
            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
            Malicious:false
            Preview:[ZoneTransfer]....ZoneId=0
            Process:C:\Users\user\Desktop\server.exe
            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
            Category:dropped
            Size (bytes):95232
            Entropy (8bit):5.559943444120193
            Encrypted:false
            SSDEEP:768:LY3oxnD9O/pBcxYsbae6GIXb9pDX2t9zPL0OXLeuXxrjEtCdnl2pi1Rz4Rk3usG1:hxxOx6baIa9ROj00ljEwzGi1dDKDJgS
            MD5:E4B99200FB42EE229FBB41F2CF56D8F8
            SHA1:EDF6652F563FDC69788FB9C4E8B9499C412095FD
            SHA-256:ADAE7B74DB9B2C08ABCC5F6B0165896726A36EB412E780710E242A97B12554F9
            SHA-512:0A7F68FA37F55242E3D5E8B385A0EEFDF971C5F196E20B34F931D339220E31A224769827129AAB0444CDAD4F7BE78014DC9347749E90A6EC563074ABE130DCB5
            Malicious:true
            Antivirus:
            • Antivirus: ReversingLabs, Detection: 84%
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...&.{g.................p............... ........@.. ....................................@.....................................S.................................................................................... ............... ..H............text....o... ...p.................. ..`.reloc...............r..............@..B................................................................H.......................................................................&.(......**..(......*.s.........s ........s!........s".........*.0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
            Process:C:\Users\user\Desktop\server.exe
            File Type:ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):26
            Entropy (8bit):3.95006375643621
            Encrypted:false
            SSDEEP:3:ggPYV:rPYV
            MD5:187F488E27DB4AF347237FE461A079AD
            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
            Malicious:false
            Preview:[ZoneTransfer]....ZoneId=0
            Process:C:\Windows\SysWOW64\netsh.exe
            File Type:ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):313
            Entropy (8bit):4.971939296804078
            Encrypted:false
            SSDEEP:6:/ojfKsUTGN8Ypox42k9L+DbGMKeQE+vigqAZs2E+AYeDPO+Yswyha:wjPIGNrkHk9iaeIM6ADDPOHyha
            MD5:689E2126A85BF55121488295EE068FA1
            SHA1:09BAAA253A49D80C18326DFBCA106551EBF22DD6
            SHA-256:D968A966EF474068E41256321F77807A042F1965744633D37A203A705662EC25
            SHA-512:C3736A8FC7E6573FA1B26FE6A901C05EE85C55A4A276F8F569D9EADC9A58BEC507D1BB90DBF9EA62AE79A6783178C69304187D6B90441D82E46F5F56172B5C5C
            Malicious:false
            Preview:..IMPORTANT: Command executed successfully...However, "netsh firewall" is deprecated;..use "netsh advfirewall firewall" instead...For more information on using "netsh advfirewall firewall" commands..instead of "netsh firewall", see KB article 947709..at https://go.microsoft.com/fwlink/?linkid=121488 .....Ok.....
            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
            Entropy (8bit):5.559943444120193
            TrID:
            • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
            • Win32 Executable (generic) a (10002005/4) 49.75%
            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
            • Windows Screen Saver (13104/52) 0.07%
            • Generic Win/DOS Executable (2004/3) 0.01%
            File name:server.exe
            File size:95'232 bytes
            MD5:e4b99200fb42ee229fbb41f2cf56d8f8
            SHA1:edf6652f563fdc69788fb9c4e8b9499c412095fd
            SHA256:adae7b74db9b2c08abcc5f6b0165896726a36eb412e780710e242a97b12554f9
            SHA512:0a7f68fa37f55242e3d5e8b385a0eefdf971c5f196e20b34f931d339220e31a224769827129aab0444cdad4f7be78014dc9347749e90a6ec563074abe130dcb5
            SSDEEP:768:LY3oxnD9O/pBcxYsbae6GIXb9pDX2t9zPL0OXLeuXxrjEtCdnl2pi1Rz4Rk3usG1:hxxOx6baIa9ROj00ljEwzGi1dDKDJgS
            TLSH:4B93E84977E52524E5BF56F79871F2004E34B48B1602E39D48F219AA1B33AC44F89FEB
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...&.{g.................p............... ........@.. ....................................@................................
            Icon Hash:90cececece8e8eb0
            Entrypoint:0x418efe
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x400000
            Subsystem:windows gui
            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Time Stamp:0x677BA226 [Mon Jan 6 09:28:06 2025 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:4
            OS Version Minor:0
            File Version Major:4
            File Version Minor:0
            Subsystem Version Major:4
            Subsystem Version Minor:0
            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
            Instruction
            jmp dword ptr [00402000h]
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0x18ea80x53.text
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x1a0000xc.reloc
            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x20000x16f040x17000390eba142aa2c2822d78e03b14cad0fbFalse0.36808975883152173data5.591783274337322IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            .reloc0x1a0000xc0x20002466978873e232bef309f048b95192fFalse0.041015625data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            DLLImport
            mscoree.dll_CorExeMain
            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
            2025-01-06T12:39:59.703675+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.44973077.90.22.455552TCP
            2025-01-06T12:39:59.703675+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.44973077.90.22.455552TCP
            2025-01-06T12:40:05.918199+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.44973077.90.22.455552TCP
            TimestampSource PortDest PortSource IPDest IP
            Jan 6, 2025 12:39:59.542787075 CET497305552192.168.2.477.90.22.45
            Jan 6, 2025 12:39:59.547713995 CET55524973077.90.22.45192.168.2.4
            Jan 6, 2025 12:39:59.547804117 CET497305552192.168.2.477.90.22.45
            Jan 6, 2025 12:39:59.703675032 CET497305552192.168.2.477.90.22.45
            Jan 6, 2025 12:39:59.708580971 CET55524973077.90.22.45192.168.2.4
            Jan 6, 2025 12:39:59.708652973 CET497305552192.168.2.477.90.22.45
            Jan 6, 2025 12:39:59.713480949 CET55524973077.90.22.45192.168.2.4
            Jan 6, 2025 12:40:05.918199062 CET497305552192.168.2.477.90.22.45
            Jan 6, 2025 12:40:05.923172951 CET55524973077.90.22.45192.168.2.4

            Click to jump to process

            Click to jump to process

            Click to dive into process behavior distribution

            Click to jump to process

            Target ID:0
            Start time:06:39:53
            Start date:06/01/2025
            Path:C:\Users\user\Desktop\server.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\Desktop\server.exe"
            Imagebase:0xdc0000
            File size:95'232 bytes
            MD5 hash:E4B99200FB42EE229FBB41F2CF56D8F8
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000000.00000000.1656549731.0000000000DC2000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: 00000000.00000000.1656549731.0000000000DC2000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
            • Rule: Njrat, Description: detect njRAT in memory, Source: 00000000.00000000.1656549731.0000000000DC2000.00000002.00000001.01000000.00000003.sdmp, Author: JPCERT/CC Incident Response Group
            Reputation:low
            Has exited:false

            Target ID:1
            Start time:06:39:55
            Start date:06/01/2025
            Path:C:\Windows\SysWOW64\netsh.exe
            Wow64 process (32bit):true
            Commandline:netsh firewall add allowedprogram "C:\Users\user\Desktop\server.exe" "server.exe" ENABLE
            Imagebase:0x1560000
            File size:82'432 bytes
            MD5 hash:4E89A1A088BE715D6C946E55AB07C7DF
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:2
            Start time:06:39:56
            Start date:06/01/2025
            Path:C:\Windows\System32\conhost.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Imagebase:0x7ff7699e0000
            File size:862'208 bytes
            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Reset < >

              Execution Graph

              Execution Coverage:21.4%
              Dynamic/Decrypted Code Coverage:100%
              Signature Coverage:3.4%
              Total number of Nodes:88
              Total number of Limit Nodes:4
              execution_graph 8422 16da72e 8423 16da77e OleGetClipboard 8422->8423 8424 16da78c 8423->8424 8425 16daeae 8426 16daee3 ReadFile 8425->8426 8428 16daf15 8426->8428 8370 56c126a 8372 56c129f GetProcessTimes 8370->8372 8373 56c12d1 8372->8373 8429 56c06aa 8430 56c06e2 WSASocketW 8429->8430 8432 56c071e 8430->8432 8374 16db06a 8375 16db0a2 CreateMutexW 8374->8375 8377 16db0e5 8375->8377 8378 16dac6a 8381 16dac9f GetFileType 8378->8381 8380 16daccc 8381->8380 8433 16db8aa 8436 16db8d0 DeleteFileW 8433->8436 8435 16db8ec 8436->8435 8382 56c16e6 8385 56c1721 LoadLibraryA 8382->8385 8384 56c175e 8385->8384 8437 16daaa6 8438 16daade CreateFileW 8437->8438 8440 16dab2d 8438->8440 8386 56c2762 8389 56c2797 GetProcessWorkingSetSize 8386->8389 8388 56c27c3 8389->8388 8394 16db7e2 8397 16db80b CopyFileW 8394->8397 8396 16db832 8397->8396 8398 56c0cfe 8400 56c0d36 MapViewOfFile 8398->8400 8401 56c0d85 8400->8401 8445 56c143a 8446 56c146f WSAConnect 8445->8446 8448 56c148e 8446->8448 8449 56c22b6 8450 56c22df select 8449->8450 8452 56c2314 8450->8452 8402 16db4f6 8404 16db531 SendMessageTimeoutA 8402->8404 8405 16db579 8404->8405 8406 56c0b4e 8407 56c0b86 ConvertStringSecurityDescriptorToSecurityDescriptorW 8406->8407 8409 56c0bc7 8407->8409 8456 16db40e 8457 16db443 RegSetValueExW 8456->8457 8459 16db48f 8457->8459 8460 56c250a 8461 56c2539 AdjustTokenPrivileges 8460->8461 8463 56c255b 8461->8463 8464 56c200a 8465 56c2042 RegCreateKeyExW 8464->8465 8467 56c20b4 8465->8467 8410 56c2846 8412 56c287b SetProcessWorkingSetSize 8410->8412 8413 56c28a7 8412->8413 8468 56c2686 8470 56c26bb GetExitCodeProcess 8468->8470 8471 56c26e4 8470->8471 8472 16da186 8473 16da1bb send 8472->8473 8474 16da1f3 8472->8474 8475 16da1c9 8473->8475 8474->8473 8414 16da65e 8415 16da68a CloseHandle 8414->8415 8416 16da6c0 8414->8416 8417 16da698 8415->8417 8416->8415 8418 56c21da 8421 56c220f ioctlsocket 8418->8421 8420 56c223b 8421->8420 8476 16da59a 8477 16da5d8 DuplicateHandle 8476->8477 8478 16da610 8476->8478 8479 16da5e6 8477->8479 8478->8477 8480 16db31a 8481 16db34f RegQueryValueExW 8480->8481 8483 16db3a3 8481->8483 8484 16daa12 8485 16daa3e SetErrorMode 8484->8485 8486 16daa67 8484->8486 8487 16daa53 8485->8487 8486->8485 8488 16db212 8491 16db24a RegOpenKeyExW 8488->8491 8490 16db2a0 8491->8490

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 0 5594298-55942c9 3 55942cf-5594350 0->3 4 5594352-559435a 0->4 3->4 32 559435c 3->32 5 5594366-559437a 4->5 6 559452f-559467d 5->6 7 5594380-55943bc 5->7 45 559480d-5594821 6->45 46 5594683-55947d2 6->46 19 55943ed-55944ef 7->19 20 55943be-55943e6 7->20 19->6 20->19 32->5 47 559496f-5594983 45->47 48 5594827-559492c 45->48 46->45 50 5594985-559498b call 5594210 47->50 51 55949d6-55949ea 47->51 252 5594934 48->252 58 5594990-559499b 50->58 55 55949ec-55949f7 51->55 56 5594a32-5594a46 51->56 55->56 59 5594a4c-5594b59 56->59 60 5594b94-5594ba8 56->60 58->51 59->60 63 5594bae-5594bc2 60->63 64 5594cd4-5594ce8 60->64 71 5594bd0-5594be4 63->71 72 5594bc4-5594bcb 63->72 67 5594cee-5594f2d 64->67 68 5594f74-5594f88 64->68 67->68 74 5594f8a-5594f9b 68->74 75 5594fe2-5594ff6 68->75 76 5594bef-5594c03 71->76 77 5594be6-5594bed 71->77 79 5594c48-5594c5c 72->79 74->75 83 5594ff8-5594ffe 75->83 84 5595045-5595059 75->84 86 5594c0e-5594c22 76->86 87 5594c05-5594c0c 76->87 77->79 88 5594c5e-5594c74 79->88 89 5594c76-5594c82 79->89 83->84 92 559505b 84->92 93 55950a2-55950b6 84->93 94 5594c2d-5594c41 86->94 95 5594c24-5594c2b 86->95 87->79 90 5594c8d 88->90 89->90 90->64 92->93 101 55950b8-55950e1 93->101 102 559512d-5595141 93->102 94->79 103 5594c43-5594c45 94->103 95->79 101->102 107 55953b4-55953c8 102->107 108 5595147-5595363 102->108 103->79 115 559549e-55954b2 107->115 116 55953ce-5595457 107->116 489 5595365 108->489 490 5595367 108->490 120 55954b8-5595628 115->120 121 559566f-5595683 115->121 116->115 120->121 126 5595689-5595794 121->126 127 55957e6-55957fa 121->127 418 559579f 126->418 131 559595d-5595971 127->131 132 5595800-559590b 127->132 139 5595ad4-5595ae8 131->139 140 5595977-5595a82 131->140 426 5595916 132->426 145 5595c4b-5595c5f 139->145 146 5595aee-5595bf9 139->146 443 5595a8d 140->443 152 5595dc2-5595dd6 145->152 153 5595c65-5595d70 145->153 449 5595c04 146->449 158 5595f39-5595f4d 152->158 159 5595ddc-5595ee7 152->159 464 5595d7b 153->464 165 55960b0-55960c4 158->165 166 5595f53-5596069 158->166 469 5595ef2 159->469 174 55960ca-55961d5 165->174 175 5596227-559623b 165->175 166->165 496 55961e0 174->496 188 559639e-55963b2 175->188 189 5596241-559634c 175->189 199 55963b8-55963fd call 5594278 188->199 200 5596536-559654a 188->200 499 5596357 189->499 323 55964bd-55964df 199->323 205 559668d-55966a1 200->205 206 5596550-559656f 200->206 216 55967ee-5596802 205->216 217 55966a7-55967a7 205->217 239 5596614-5596636 206->239 225 5596808-5596908 216->225 226 559694f-5596963 216->226 217->216 225->226 243 5596969-5596a69 226->243 244 5596ab0-5596ada 226->244 250 559663c 239->250 251 5596574-5596583 239->251 243->244 265 5596b9a-5596bae 244->265 266 5596ae0-5596b53 244->266 250->205 260 5596589-55965bc 251->260 261 559663e 251->261 252->47 353 55965be-55965f8 260->353 354 5596603-559660c 260->354 294 5596643-559668b 261->294 278 5596c8b-5596c9f 265->278 279 5596bb4-5596c44 265->279 266->265 288 5596de5-5596df9 278->288 289 5596ca5-5596d9e 278->289 279->278 299 559705c-5597070 288->299 300 5596dff-5596e4f 288->300 289->288 294->205 310 5597158-559715f 299->310 311 5597076-5597111 call 5594278 * 2 299->311 419 5596ebd-5596ee8 300->419 420 5596e51-5596e77 300->420 311->310 337 5596402-5596411 323->337 338 55964e5 323->338 349 55964e7 337->349 350 5596417-55964b5 337->350 338->200 384 55964ec-5596534 349->384 350->384 491 55964b7 350->491 353->354 354->294 366 559660e 354->366 366->239 384->200 418->127 492 5596eee-5596fc1 419->492 493 5596fc6-5597057 419->493 494 5596e79-5596e99 420->494 495 5596eb8 420->495 426->131 443->139 449->145 464->152 469->158 500 559536d 489->500 490->500 491->323 492->299 493->299 494->495 495->299 496->175 499->188 500->107
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.4109979889.0000000005590000.00000040.00000800.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5590000_server.jbxd
              Similarity
              • API ID:
              • String ID: @$\Ok$2k
              • API String ID: 0-1545420168
              • Opcode ID: 15ca9cbfeaeec576adf14c44b999c2aa963f4f75d73bcd1052efcc92cb50ffa3
              • Instruction ID: fc028a53c15d26c0d33dd2ae132a08d60d44ad730a7cbde3a542670faf92a3f6
              • Opcode Fuzzy Hash: 15ca9cbfeaeec576adf14c44b999c2aa963f4f75d73bcd1052efcc92cb50ffa3
              • Instruction Fuzzy Hash: E0233974A01228CFEB25DF34D995BA9B7B2FB48305F1041E9E909A7394DB399E85CF40

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 556 5594269-5594288 557 559428a-55942af 556->557 558 55942b1-55942c9 556->558 557->558 560 55942cf-5594350 558->560 561 5594352-559435a 558->561 560->561 589 559435c 560->589 562 5594366-559437a 561->562 563 559452f-559467d 562->563 564 5594380-55943bc 562->564 602 559480d-5594821 563->602 603 5594683-55947d2 563->603 576 55943ed-55944ef 564->576 577 55943be-55943e6 564->577 576->563 577->576 589->562 604 559496f-5594983 602->604 605 5594827-559492c 602->605 603->602 607 5594985-559498b call 5594210 604->607 608 55949d6-55949ea 604->608 809 5594934 605->809 615 5594990-559499b 607->615 612 55949ec-55949f7 608->612 613 5594a32-5594a46 608->613 612->613 616 5594a4c-5594b59 613->616 617 5594b94-5594ba8 613->617 615->608 616->617 620 5594bae-5594bc2 617->620 621 5594cd4-5594ce8 617->621 628 5594bd0-5594be4 620->628 629 5594bc4-5594bcb 620->629 624 5594cee-5594f2d 621->624 625 5594f74-5594f88 621->625 624->625 631 5594f8a-5594f9b 625->631 632 5594fe2-5594ff6 625->632 633 5594bef-5594c03 628->633 634 5594be6-5594bed 628->634 636 5594c48-5594c5c 629->636 631->632 640 5594ff8-5594ffe 632->640 641 5595045-5595059 632->641 643 5594c0e-5594c22 633->643 644 5594c05-5594c0c 633->644 634->636 645 5594c5e-5594c74 636->645 646 5594c76-5594c82 636->646 640->641 649 559505b 641->649 650 55950a2-55950b6 641->650 651 5594c2d-5594c41 643->651 652 5594c24-5594c2b 643->652 644->636 647 5594c8d 645->647 646->647 647->621 649->650 658 55950b8-55950e1 650->658 659 559512d-5595141 650->659 651->636 660 5594c43-5594c45 651->660 652->636 658->659 664 55953b4-55953c8 659->664 665 5595147-5595363 659->665 660->636 672 559549e-55954b2 664->672 673 55953ce-5595457 664->673 1046 5595365 665->1046 1047 5595367 665->1047 677 55954b8-5595628 672->677 678 559566f-5595683 672->678 673->672 677->678 683 5595689-5595794 678->683 684 55957e6-55957fa 678->684 975 559579f 683->975 688 559595d-5595971 684->688 689 5595800-559590b 684->689 696 5595ad4-5595ae8 688->696 697 5595977-5595a82 688->697 983 5595916 689->983 702 5595c4b-5595c5f 696->702 703 5595aee-5595bf9 696->703 1000 5595a8d 697->1000 709 5595dc2-5595dd6 702->709 710 5595c65-5595d70 702->710 1006 5595c04 703->1006 715 5595f39-5595f4d 709->715 716 5595ddc-5595ee7 709->716 1021 5595d7b 710->1021 722 55960b0-55960c4 715->722 723 5595f53-5596069 715->723 1026 5595ef2 716->1026 731 55960ca-55961d5 722->731 732 5596227-559623b 722->732 723->722 1053 55961e0 731->1053 745 559639e-55963b2 732->745 746 5596241-559634c 732->746 756 55963b8-55963fd call 5594278 745->756 757 5596536-559654a 745->757 1056 5596357 746->1056 880 55964bd-55964df 756->880 762 559668d-55966a1 757->762 763 5596550-559656f 757->763 773 55967ee-5596802 762->773 774 55966a7-55967a7 762->774 796 5596614-5596636 763->796 782 5596808-5596908 773->782 783 559694f-5596963 773->783 774->773 782->783 800 5596969-5596a69 783->800 801 5596ab0-5596ada 783->801 807 559663c 796->807 808 5596574-5596583 796->808 800->801 822 5596b9a-5596bae 801->822 823 5596ae0-5596b53 801->823 807->762 817 5596589-55965bc 808->817 818 559663e 808->818 809->604 910 55965be-55965f8 817->910 911 5596603-559660c 817->911 851 5596643-559668b 818->851 835 5596c8b-5596c9f 822->835 836 5596bb4-5596c44 822->836 823->822 845 5596de5-5596df9 835->845 846 5596ca5-5596d9e 835->846 836->835 856 559705c-5597070 845->856 857 5596dff-5596e4f 845->857 846->845 851->762 867 5597158-559715f 856->867 868 5597076-5597111 call 5594278 * 2 856->868 976 5596ebd-5596ee8 857->976 977 5596e51-5596e77 857->977 868->867 894 5596402-5596411 880->894 895 55964e5 880->895 906 55964e7 894->906 907 5596417-55964b5 894->907 895->757 941 55964ec-5596534 906->941 907->941 1048 55964b7 907->1048 910->911 911->851 923 559660e 911->923 923->796 941->757 975->684 1049 5596eee-5596fc1 976->1049 1050 5596fc6-5597057 976->1050 1051 5596e79-5596e99 977->1051 1052 5596eb8 977->1052 983->688 1000->696 1006->702 1021->709 1026->715 1057 559536d 1046->1057 1047->1057 1048->880 1049->856 1050->856 1051->1052 1052->856 1053->732 1056->745 1057->664
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.4109979889.0000000005590000.00000040.00000800.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5590000_server.jbxd
              Similarity
              • API ID:
              • String ID: $\Ok$2k
              • API String ID: 0-804809350
              • Opcode ID: b737b5ae66a0ee6ffdbd4180c1e096e9e26a577ba2450ef70979bbdebeed15a2
              • Instruction ID: 2352b285f819d2418f84be7dbdad1f53020e295c0cc117fde26626d8e6c7e045
              • Opcode Fuzzy Hash: b737b5ae66a0ee6ffdbd4180c1e096e9e26a577ba2450ef70979bbdebeed15a2
              • Instruction Fuzzy Hash: E8135A74A01228CFEB25DF34D995BA9B7B2FB48305F1041EAE909A7394DB395E85CF40
              APIs
              • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 056C2553
              Memory Dump Source
              • Source File: 00000000.00000002.4110079619.00000000056C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_56c0000_server.jbxd
              Similarity
              • API ID: AdjustPrivilegesToken
              • String ID:
              • API String ID: 2874748243-0
              • Opcode ID: b363a2603b7a6a1d18ac6ec728e08f78036f168626359e692e2f1875be72c226
              • Instruction ID: bc46ae3cfbf7c18296661adb2e914cdaa817f1ab12562eb202e89e822eefd925
              • Opcode Fuzzy Hash: b363a2603b7a6a1d18ac6ec728e08f78036f168626359e692e2f1875be72c226
              • Instruction Fuzzy Hash: C321D1765097809FEB228F25DC54B62BFF4EF06310F0885DAED858F663D2709908CB61
              APIs
              • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 056C2553
              Memory Dump Source
              • Source File: 00000000.00000002.4110079619.00000000056C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_56c0000_server.jbxd
              Similarity
              • API ID: AdjustPrivilegesToken
              • String ID:
              • API String ID: 2874748243-0
              • Opcode ID: 2619d9526b1d57faed296a855ed1337078a5a3f7708dc9530cf62125ebab1c00
              • Instruction ID: 009c5662341b1436fe82783b3770931cd879448dc50015ac1376f7a82b64bcbf
              • Opcode Fuzzy Hash: 2619d9526b1d57faed296a855ed1337078a5a3f7708dc9530cf62125ebab1c00
              • Instruction Fuzzy Hash: 471191766006009FDB20CF15D954B66FBE5EF08210F0884AEDD868B655D375E414CB61

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1113 5593802-5593911 1130 5593913 1113->1130 1131 5593917-5593919 1113->1131 1132 559391b 1130->1132 1133 5593915 1130->1133 1134 5593920-5593927 1131->1134 1132->1134 1133->1131 1135 55939bd-5593adf 1134->1135 1136 559392d-55939b2 1134->1136 1160 5593b5b-5593bae 1135->1160 1161 5593ae1-5593b51 1135->1161 1136->1135 1168 5593bb0 1160->1168 1169 5593bb5 1160->1169 1161->1160 1168->1169 1249 5593bb5 call 5594269 1169->1249 1250 5593bb5 call 5594298 1169->1250 1251 5593bb5 call 16c05e4 1169->1251 1252 5593bb5 call 16c0606 1169->1252 1171 5593bbb-5593bcf 1172 5593bd1-5593bfb 1171->1172 1173 5593c06-5593cbb 1171->1173 1172->1173 1184 5593cc1-5593cff 1173->1184 1185 5593d43 1173->1185 1184->1185 1186 55941dd-55941e8 1185->1186 1187 5593d48-5593d66 1186->1187 1188 55941ee-55941f5 1186->1188 1192 5593d68-5593d6e 1187->1192 1193 5593d71-5593d7c 1187->1193 1192->1193 1197 5594193-55941db 1193->1197 1198 5593d82-5593d96 1193->1198 1197->1186 1199 5593d98 1198->1199 1200 5593e0e-5593e1f 1198->1200 1204 5593d9d-5593dca 1199->1204 1202 5593e6f-5593e7d 1200->1202 1203 5593e21-5593e4b 1200->1203 1205 5594191 1202->1205 1206 5593e83-5593f36 1202->1206 1203->1202 1213 5593e4d-5593e69 call 55994af 1203->1213 1204->1200 1205->1186 1226 5593f3c-5593fbf 1206->1226 1227 5593fc6-55940bd 1206->1227 1213->1202 1226->1227 1242 559414d 1227->1242 1243 55940c3-5594146 1227->1243 1242->1205 1243->1242 1249->1171 1250->1171 1251->1171 1252->1171
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.4109979889.0000000005590000.00000040.00000800.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5590000_server.jbxd
              Similarity
              • API ID:
              • String ID: \Ok$2k
              • API String ID: 0-3697909212
              • Opcode ID: 849d34d7834dde139f41a41bc7cf950d901f474f24c2bb8ef2edcd1fbc3dc789
              • Instruction ID: 0ba15f77ce96a0e518edb8c5f9de1d590d6c0b659ea54e05bd843e5cc5b8876d
              • Opcode Fuzzy Hash: 849d34d7834dde139f41a41bc7cf950d901f474f24c2bb8ef2edcd1fbc3dc789
              • Instruction Fuzzy Hash: 1F322430A00228CFDB28DF74D955BACB7B2FB49309F1045A9D50AAB394DB799E85CF50

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1254 55900b8-55900cd 1276 55900d0 call 16da20c 1254->1276 1277 55900d0 call 16da23a 1254->1277 1278 55900d0 call 16c05e4 1254->1278 1279 55900d0 call 16c0606 1254->1279 1256 55900d5-55900d9 1280 55900dc call 16da2fe 1256->1280 1281 55900dc call 16da2d2 1256->1281 1257 55900e1-55900f7 1259 55900f9-5590100 1257->1259 1260 559010b-55901d5 1257->1260 1261 5590107-559010a 1259->1261 1282 55901d5 call 5593b18 1260->1282 1283 55901d5 call 55939bf 1260->1283 1284 55901d5 call 16c05e4 1260->1284 1285 55901d5 call 16c0606 1260->1285 1286 55901d5 call 5593802 1260->1286 1275 55901db-55901de 1276->1256 1277->1256 1278->1256 1279->1256 1280->1257 1281->1257 1282->1275 1283->1275 1284->1275 1285->1275 1286->1275
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.4109979889.0000000005590000.00000040.00000800.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5590000_server.jbxd
              Similarity
              • API ID:
              • String ID: 2k$2k
              • API String ID: 0-107389494
              • Opcode ID: 8fd201b2f3be322b4719a031ca0b201af1a42d05d108cc96c52cba33b751cdac
              • Instruction ID: 43740fc10cc6d82eaf4ea06ceb22db6bf24b04d57926c2d7c08613ea769f6e27
              • Opcode Fuzzy Hash: 8fd201b2f3be322b4719a031ca0b201af1a42d05d108cc96c52cba33b751cdac
              • Instruction Fuzzy Hash: D731F4306053409FD714AB759C16A6E3BA7ABC2658B1485AEE001CF391CF7E8C49C792

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1287 5590118-5590169 1292 5590174-559017a 1287->1292 1293 5590181-55901bd 1292->1293 1298 55901c8-55901d5 1293->1298 1301 55901d5 call 5593b18 1298->1301 1302 55901d5 call 55939bf 1298->1302 1303 55901d5 call 16c05e4 1298->1303 1304 55901d5 call 16c0606 1298->1304 1305 55901d5 call 5593802 1298->1305 1300 55901db-55901de 1301->1300 1302->1300 1303->1300 1304->1300 1305->1300
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.4109979889.0000000005590000.00000040.00000800.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5590000_server.jbxd
              Similarity
              • API ID:
              • String ID: 2k$2k
              • API String ID: 0-107389494
              • Opcode ID: 5c9139e86838973896c452a4f6630f91e93b57825c958e5aaf7ec0f11e38c1b3
              • Instruction ID: d1c86036c21cb60f25fa8dcef10bd1b7dfbf4a742ff02ef58e73928d687b72a0
              • Opcode Fuzzy Hash: 5c9139e86838973896c452a4f6630f91e93b57825c958e5aaf7ec0f11e38c1b3
              • Instruction Fuzzy Hash: 931106346042008FC324A779E816A7936D7ABC2258314857EE002CF345CFBD8C49C7A2

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1306 56c1faa-56c2062 1310 56c2064 1306->1310 1311 56c2067-56c2073 1306->1311 1310->1311 1312 56c2078-56c2081 1311->1312 1313 56c2075 1311->1313 1314 56c2086-56c209d 1312->1314 1315 56c2083 1312->1315 1313->1312 1317 56c20df-56c20e4 1314->1317 1318 56c209f-56c20b2 RegCreateKeyExW 1314->1318 1315->1314 1317->1318 1319 56c20b4-56c20dc 1318->1319 1320 56c20e6-56c20eb 1318->1320 1320->1319
              APIs
              • RegCreateKeyExW.KERNELBASE(?,00000E24), ref: 056C20A5
              Memory Dump Source
              • Source File: 00000000.00000002.4110079619.00000000056C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_56c0000_server.jbxd
              Similarity
              • API ID: Create
              • String ID:
              • API String ID: 2289755597-0
              • Opcode ID: 820394cca74e5eb62e44e15344222a96c3f42783c730e252bc30459a5e383e91
              • Instruction ID: d023ccee2017be3c351edd2e359c7ce963436bc570fb37754a52c32eca4c2917
              • Opcode Fuzzy Hash: 820394cca74e5eb62e44e15344222a96c3f42783c730e252bc30459a5e383e91
              • Instruction Fuzzy Hash: 2C4180751093806FE7238B258C50FA6BFB8EF06214F0985DBE9C5CB663D224E849CB71

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1325 56c0597-56c05b7 1326 56c05d9-56c060b 1325->1326 1327 56c05b9-56c05d8 1325->1327 1331 56c060e-56c0666 RegQueryValueExW 1326->1331 1327->1326 1333 56c066c-56c0682 1331->1333
              APIs
              • RegQueryValueExW.KERNELBASE(?,00000E24,?,?), ref: 056C065E
              Memory Dump Source
              • Source File: 00000000.00000002.4110079619.00000000056C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_56c0000_server.jbxd
              Similarity
              • API ID: QueryValue
              • String ID:
              • API String ID: 3660427363-0
              • Opcode ID: 35d15ad890168c72588eeddc6f1de14eabc68b22d997aa7bc1a87b963269e1f4
              • Instruction ID: 1197876d0c25cbe9273613c40ee509cd21cf9e1857d0e28834b2af04e8176417
              • Opcode Fuzzy Hash: 35d15ad890168c72588eeddc6f1de14eabc68b22d997aa7bc1a87b963269e1f4
              • Instruction Fuzzy Hash: B0316D7510E7C0AFD3138B258C65A61BFB4EF47610B0E45CBD8C48F6A3D6296909D7B2

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1334 16db1e6-16db1e8 1335 16db1ea-16db1f1 1334->1335 1336 16db1f2-16db26d 1334->1336 1335->1336 1340 16db26f 1336->1340 1341 16db272-16db289 1336->1341 1340->1341 1343 16db2cb-16db2d0 1341->1343 1344 16db28b-16db29e RegOpenKeyExW 1341->1344 1343->1344 1345 16db2a0-16db2c8 1344->1345 1346 16db2d2-16db2d7 1344->1346 1346->1345
              APIs
              • RegOpenKeyExW.KERNELBASE(?,00000E24), ref: 016DB291
              Memory Dump Source
              • Source File: 00000000.00000002.4102729661.00000000016DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 016DA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_16da000_server.jbxd
              Similarity
              • API ID: Open
              • String ID:
              • API String ID: 71445658-0
              • Opcode ID: acfcd9977a63cb240632448be3a9193392797acdd61e26b168a68d819e5ee107
              • Instruction ID: 9aefa647e3e701711db2951cf9d5916addb56ccf6ea391825c9fdd9cbefca3d4
              • Opcode Fuzzy Hash: acfcd9977a63cb240632448be3a9193392797acdd61e26b168a68d819e5ee107
              • Instruction Fuzzy Hash: 3831A4725083806FE7228B65DC45FAABFBCEF06210F08859BE984CB653D324E909C771

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1351 16daa75-16daafe 1355 16dab00 1351->1355 1356 16dab03-16dab0f 1351->1356 1355->1356 1357 16dab14-16dab1d 1356->1357 1358 16dab11 1356->1358 1359 16dab1f-16dab43 CreateFileW 1357->1359 1360 16dab6e-16dab73 1357->1360 1358->1357 1363 16dab75-16dab7a 1359->1363 1364 16dab45-16dab6b 1359->1364 1360->1359 1363->1364
              APIs
              • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 016DAB25
              Memory Dump Source
              • Source File: 00000000.00000002.4102729661.00000000016DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 016DA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_16da000_server.jbxd
              Similarity
              • API ID: CreateFile
              • String ID:
              • API String ID: 823142352-0
              • Opcode ID: 2f44e294d2213e3741679fd6a9ae1a0bf094f1889c10e02ad579591fe6988bb0
              • Instruction ID: c015396fbd4b07d2005d89fe1d373c7c3dd1ab5603c49125586b72f0f508e0e8
              • Opcode Fuzzy Hash: 2f44e294d2213e3741679fd6a9ae1a0bf094f1889c10e02ad579591fe6988bb0
              • Instruction Fuzzy Hash: D531A071508340AFE722CF65DD84F56BFF8EF05210F08899AE9858B652D375E909CB61

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1415 56c122c-56c12c1 1420 56c130e-56c1313 1415->1420 1421 56c12c3-56c12cb GetProcessTimes 1415->1421 1420->1421 1423 56c12d1-56c12e3 1421->1423 1424 56c1315-56c131a 1423->1424 1425 56c12e5-56c130b 1423->1425 1424->1425
              APIs
              • GetProcessTimes.KERNELBASE(?,00000E24,70E21FBB,00000000,00000000,00000000,00000000), ref: 056C12C9
              Memory Dump Source
              • Source File: 00000000.00000002.4110079619.00000000056C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_56c0000_server.jbxd
              Similarity
              • API ID: ProcessTimes
              • String ID:
              • API String ID: 1995159646-0
              • Opcode ID: d75b23c5b546f1a4849f2ee3942eb0e2aa8154dace15be88e286cfec83c5416c
              • Instruction ID: 6d44a74a791e9c3485730fb635b8613b6f5fcf8112fa9eb97da279c49b32bcdc
              • Opcode Fuzzy Hash: d75b23c5b546f1a4849f2ee3942eb0e2aa8154dace15be88e286cfec83c5416c
              • Instruction Fuzzy Hash: B031F4725087806FE7228F54DD45FA6BFB8EF06214F0889DAE9858F193D234A909CB71

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1400 56c0b28-56c0ba9 1404 56c0bae-56c0bb7 1400->1404 1405 56c0bab 1400->1405 1406 56c0c0f-56c0c14 1404->1406 1407 56c0bb9-56c0bc1 ConvertStringSecurityDescriptorToSecurityDescriptorW 1404->1407 1405->1404 1406->1407 1409 56c0bc7-56c0bd9 1407->1409 1410 56c0bdb-56c0c0c 1409->1410 1411 56c0c16-56c0c1b 1409->1411 1411->1410
              APIs
              • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32(?,00000E24), ref: 056C0BBF
              Memory Dump Source
              • Source File: 00000000.00000002.4110079619.00000000056C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_56c0000_server.jbxd
              Similarity
              • API ID: DescriptorSecurity$ConvertString
              • String ID:
              • API String ID: 3907675253-0
              • Opcode ID: 57e7737232dd573a616c04d11690d1cfc443478ef43b5055fcff7891f8442fb3
              • Instruction ID: cb4223038b482c9ca4ce3bab1fa1cb6acb3c872481a0810b43c087a375ae8a18
              • Opcode Fuzzy Hash: 57e7737232dd573a616c04d11690d1cfc443478ef43b5055fcff7891f8442fb3
              • Instruction Fuzzy Hash: 03318071604344AFE7218B64DC45FAABFF8EF05220F0884AAE945DB652D334E948CB61

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1383 16db2d9-16db357 1386 16db35c-16db365 1383->1386 1387 16db359 1383->1387 1388 16db36a-16db370 1386->1388 1389 16db367 1386->1389 1387->1386 1390 16db375-16db38c 1388->1390 1391 16db372 1388->1391 1389->1388 1393 16db38e-16db3a1 RegQueryValueExW 1390->1393 1394 16db3c3-16db3c8 1390->1394 1391->1390 1395 16db3ca-16db3cf 1393->1395 1396 16db3a3-16db3c0 1393->1396 1394->1393 1395->1396
              APIs
              • RegQueryValueExW.KERNELBASE(?,00000E24,70E21FBB,00000000,00000000,00000000,00000000), ref: 016DB394
              Memory Dump Source
              • Source File: 00000000.00000002.4102729661.00000000016DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 016DA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_16da000_server.jbxd
              Similarity
              • API ID: QueryValue
              • String ID:
              • API String ID: 3660427363-0
              • Opcode ID: ce54b4162e5006236301f77735af019ce652c31da1dde2e88c687584d6e898d1
              • Instruction ID: d9acff597d402a52f61deb576ed8f9bb2352a5d2a2c0fc36f9e578aae3f54121
              • Opcode Fuzzy Hash: ce54b4162e5006236301f77735af019ce652c31da1dde2e88c687584d6e898d1
              • Instruction Fuzzy Hash: 3C31E4715083806FE722CB65CC44FA2BFFCEF06210F09889AE985CB253D360E908CB61

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1367 16db036-16db0b9 1371 16db0be-16db0c7 1367->1371 1372 16db0bb 1367->1372 1373 16db0cc-16db0d5 1371->1373 1374 16db0c9 1371->1374 1372->1371 1375 16db0d7-16db0fb CreateMutexW 1373->1375 1376 16db126-16db12b 1373->1376 1374->1373 1379 16db12d-16db132 1375->1379 1380 16db0fd-16db123 1375->1380 1376->1375 1379->1380
              APIs
              • CreateMutexW.KERNELBASE(?,?), ref: 016DB0DD
              Memory Dump Source
              • Source File: 00000000.00000002.4102729661.00000000016DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 016DA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_16da000_server.jbxd
              Similarity
              • API ID: CreateMutex
              • String ID:
              • API String ID: 1964310414-0
              • Opcode ID: 1e9423355f7e321aea8f91a472df7bfa3ea0573343dcce92a15100f81b7e09d3
              • Instruction ID: 0153ef4c811ecde7fba51031d353f2aaf9615d7b1191bc378e734ce990a15bb4
              • Opcode Fuzzy Hash: 1e9423355f7e321aea8f91a472df7bfa3ea0573343dcce92a15100f81b7e09d3
              • Instruction Fuzzy Hash: 933193715097806FE722CB25DD85B96BFF8EF06210F09849AE984CF293D375A909C772

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1428 56c200a-56c2062 1431 56c2064 1428->1431 1432 56c2067-56c2073 1428->1432 1431->1432 1433 56c2078-56c2081 1432->1433 1434 56c2075 1432->1434 1435 56c2086-56c209d 1433->1435 1436 56c2083 1433->1436 1434->1433 1438 56c20df-56c20e4 1435->1438 1439 56c209f-56c20b2 RegCreateKeyExW 1435->1439 1436->1435 1438->1439 1440 56c20b4-56c20dc 1439->1440 1441 56c20e6-56c20eb 1439->1441 1441->1440
              APIs
              • RegCreateKeyExW.KERNELBASE(?,00000E24), ref: 056C20A5
              Memory Dump Source
              • Source File: 00000000.00000002.4110079619.00000000056C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_56c0000_server.jbxd
              Similarity
              • API ID: Create
              • String ID:
              • API String ID: 2289755597-0
              • Opcode ID: 1c0f33a311c1210e7bdcfc8921eed76946768250f26554ca6d4fea7ce0415e0f
              • Instruction ID: ef9aff33a0b8c7ca5ddeb913edf2d60aee4da7e010f98cb9acccf72836a51047
              • Opcode Fuzzy Hash: 1c0f33a311c1210e7bdcfc8921eed76946768250f26554ca6d4fea7ce0415e0f
              • Instruction Fuzzy Hash: 59219E76600704AFEB31DE15DC44FABFBECEF08614F04896AED86C6A51D730E948CA61

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1446 16da6ce-16da72b 1447 16da72e-16da786 OleGetClipboard 1446->1447 1449 16da78c-16da7a2 1447->1449
              APIs
              • OleGetClipboard.OLE32(?,00000E24,?,?), ref: 016DA77E
              Memory Dump Source
              • Source File: 00000000.00000002.4102729661.00000000016DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 016DA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_16da000_server.jbxd
              Similarity
              • API ID: Clipboard
              • String ID:
              • API String ID: 220874293-0
              • Opcode ID: 46e9a5fe71623aa6cef1dd16599d7f2c7e95480744be235d2430d4a39921ef73
              • Instruction ID: e52ead1efc3f1620adb0cf37705ffc4985c1856111ac40ab0443144329ae0d94
              • Opcode Fuzzy Hash: 46e9a5fe71623aa6cef1dd16599d7f2c7e95480744be235d2430d4a39921ef73
              • Instruction Fuzzy Hash: E1317E7514D3C06FD3138B259C61B62BFB4EF47610F0A41DBE884CB6A3D2296919D7B2
              APIs
              • SendMessageTimeoutA.USER32(?,00000E24), ref: 016DB571
              Memory Dump Source
              • Source File: 00000000.00000002.4102729661.00000000016DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 016DA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_16da000_server.jbxd
              Similarity
              • API ID: MessageSendTimeout
              • String ID:
              • API String ID: 1599653421-0
              • Opcode ID: 8a5c238db479f03e372dfa7c234a8e2491db039b8a6d67359ded27ec4aa6e5e1
              • Instruction ID: 224e367b03d5ed39b6071c252b4a6ed4a16e54a84145180e6e6fc66e0fad8399
              • Opcode Fuzzy Hash: 8a5c238db479f03e372dfa7c234a8e2491db039b8a6d67359ded27ec4aa6e5e1
              • Instruction Fuzzy Hash: E321E471504740AFEB228F55DC44FA6FFB8EF46310F08899AE9848F662D375A508CB61
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.4110079619.00000000056C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_56c0000_server.jbxd
              Similarity
              • API ID: select
              • String ID:
              • API String ID: 1274211008-0
              • Opcode ID: fbf6fd7d890a06b8e91bb12db4e86c7e499c2863e47569d93157f01ec3812374
              • Instruction ID: a20f394223d2964875f0135c837379521a4339a0ff45eaa4dd27732ca117884b
              • Opcode Fuzzy Hash: fbf6fd7d890a06b8e91bb12db4e86c7e499c2863e47569d93157f01ec3812374
              • Instruction Fuzzy Hash: CB219E755087849FD722CF24DC54A62BFF8EF0A210F0888DAED85CB662D234E909DB61
              APIs
              • GetExitCodeProcess.KERNELBASE(?,00000E24,70E21FBB,00000000,00000000,00000000,00000000), ref: 056C26DC
              Memory Dump Source
              • Source File: 00000000.00000002.4110079619.00000000056C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_56c0000_server.jbxd
              Similarity
              • API ID: CodeExitProcess
              • String ID:
              • API String ID: 3861947596-0
              • Opcode ID: 6184f754c99baacbe048157b4827d89dd11990223057f41df531213ba24f6fc1
              • Instruction ID: 166ce8c39bd50869274ad8e5c8416bc49f0b20bc6912d176158bde0e822cad41
              • Opcode Fuzzy Hash: 6184f754c99baacbe048157b4827d89dd11990223057f41df531213ba24f6fc1
              • Instruction Fuzzy Hash: A02192755093806FE7128B14DC55FA6BFA8EF46214F0884EAE984DF692D264A908C771
              APIs
              • ReadFile.KERNELBASE(?,00000E24,70E21FBB,00000000,00000000,00000000,00000000), ref: 016DAF0D
              Memory Dump Source
              • Source File: 00000000.00000002.4102729661.00000000016DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 016DA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_16da000_server.jbxd
              Similarity
              • API ID: FileRead
              • String ID:
              • API String ID: 2738559852-0
              • Opcode ID: e6314759fcaed367022ecd1161b1a1165c96c532252254261fb2671ee4d0e678
              • Instruction ID: dd8a901d3aaae0a7494550bb8cae994e1eb4ec573fc82059d6f99c895830dc1c
              • Opcode Fuzzy Hash: e6314759fcaed367022ecd1161b1a1165c96c532252254261fb2671ee4d0e678
              • Instruction Fuzzy Hash: 2421B4B2509380AFE722CB55DD44F56BFB8EF05314F0885DAE9849F153D274A508CB61
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.4110079619.00000000056C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_56c0000_server.jbxd
              Similarity
              • API ID: FileView
              • String ID:
              • API String ID: 3314676101-0
              • Opcode ID: 42369fc82fd1cc5df75eb9d9dbe1e47f918346618c8fc3cf285c1881f1003ece
              • Instruction ID: 0a606cecff023b80a632da201e34e891f5374a7bd9da386ee7394a910951c4d3
              • Opcode Fuzzy Hash: 42369fc82fd1cc5df75eb9d9dbe1e47f918346618c8fc3cf285c1881f1003ece
              • Instruction Fuzzy Hash: 0521B171404340AFE722CB19DD48FA6FFF8EF09224F04899EE9858B652D375B508CB61
              APIs
              • WSASocketW.WS2_32(?,?,?,?,?), ref: 056C0716
              Memory Dump Source
              • Source File: 00000000.00000002.4110079619.00000000056C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_56c0000_server.jbxd
              Similarity
              • API ID: Socket
              • String ID:
              • API String ID: 38366605-0
              • Opcode ID: f925b190b55acdf5d73f2d80779102ffaff3ee9773491af5b99258eadcd275cf
              • Instruction ID: 035b1fb250bb5db98dfc8ec051d89516569a82dc69be6ffb659df6cb9afa6581
              • Opcode Fuzzy Hash: f925b190b55acdf5d73f2d80779102ffaff3ee9773491af5b99258eadcd275cf
              • Instruction Fuzzy Hash: 3421D071504380AFE721CF55DD48FA6FFB8EF09220F08899EE9858B652C375A508CB61
              APIs
              • RegSetValueExW.KERNELBASE(?,00000E24,70E21FBB,00000000,00000000,00000000,00000000), ref: 016DB480
              Memory Dump Source
              • Source File: 00000000.00000002.4102729661.00000000016DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 016DA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_16da000_server.jbxd
              Similarity
              • API ID: Value
              • String ID:
              • API String ID: 3702945584-0
              • Opcode ID: 77a62ec8f869bb09f0f81033b1ce804dbbcea4f8a2f19989e8a7d4388c63814f
              • Instruction ID: 9407ed148a3df064d56c3882876ed5e564aff3f3dd8f1ade54fc38befd8ae228
              • Opcode Fuzzy Hash: 77a62ec8f869bb09f0f81033b1ce804dbbcea4f8a2f19989e8a7d4388c63814f
              • Instruction Fuzzy Hash: 5E21B0725057806FE722CF15DC44FA7BFBCEF46220F08859AE9858B256D364E908CBB1
              APIs
              • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32(?,00000E24), ref: 056C0BBF
              Memory Dump Source
              • Source File: 00000000.00000002.4110079619.00000000056C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_56c0000_server.jbxd
              Similarity
              • API ID: DescriptorSecurity$ConvertString
              • String ID:
              • API String ID: 3907675253-0
              • Opcode ID: 09ca41bc7c604d9d69d6bd680189eead38ed7d426ec12f2b6270218527c4ce14
              • Instruction ID: b17fd131e34974e73d5bb103c41c7459d6b544a4fceb6d40fb74f6ac0968dc56
              • Opcode Fuzzy Hash: 09ca41bc7c604d9d69d6bd680189eead38ed7d426ec12f2b6270218527c4ce14
              • Instruction Fuzzy Hash: EB218371600204AFEB20DA29DD45F6ABBECEF04224F04886AE945DB651D775E548CA61
              APIs
              • RegQueryValueExW.KERNELBASE(?,00000E24,70E21FBB,00000000,00000000,00000000,00000000), ref: 056C0AD4
              Memory Dump Source
              • Source File: 00000000.00000002.4110079619.00000000056C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_56c0000_server.jbxd
              Similarity
              • API ID: QueryValue
              • String ID:
              • API String ID: 3660427363-0
              • Opcode ID: baefc5b835694841739e69d60e1d6575cf434d65891749d0d58820722150defd
              • Instruction ID: d0fc6dfd01d8220402fb82b4cd870d2f8c24284c959662e65cf607410e6c3b5b
              • Opcode Fuzzy Hash: baefc5b835694841739e69d60e1d6575cf434d65891749d0d58820722150defd
              • Instruction Fuzzy Hash: F621D372508780AFE722CB55DD48F67BFF8EF05310F08859AE9458B692D324E908CB61
              APIs
              • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 016DAB25
              Memory Dump Source
              • Source File: 00000000.00000002.4102729661.00000000016DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 016DA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_16da000_server.jbxd
              Similarity
              • API ID: CreateFile
              • String ID:
              • API String ID: 823142352-0
              • Opcode ID: 056391776d00c9679042914c9a17bc11df9c16fce4e0cfa7fecf040869a7fb47
              • Instruction ID: 0c6b5f47068af279293a85e01a997f4ac40bd9afc392d7f0c41440b63defebe2
              • Opcode Fuzzy Hash: 056391776d00c9679042914c9a17bc11df9c16fce4e0cfa7fecf040869a7fb47
              • Instruction Fuzzy Hash: 6821B271A04700AFE721CF69DD45F66FBE8EF08210F048969EA458B752D375E509CB71
              APIs
              • RegOpenKeyExW.KERNELBASE(?,00000E24), ref: 016DB291
              Memory Dump Source
              • Source File: 00000000.00000002.4102729661.00000000016DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 016DA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_16da000_server.jbxd
              Similarity
              • API ID: Open
              • String ID:
              • API String ID: 71445658-0
              • Opcode ID: b55635031876157dba2c035a04228703a1a955465bae2e1de4949eecaf068003
              • Instruction ID: fa9942ed214981ffcd92425fc7d5cf0cd799b9bccc68baa8dc5051d72d3b59b0
              • Opcode Fuzzy Hash: b55635031876157dba2c035a04228703a1a955465bae2e1de4949eecaf068003
              • Instruction Fuzzy Hash: 3121D472900304AEE7319F59DC44FABFBFCEF19214F04896AEA458B745D734E5088AB1
              APIs
              • SetProcessWorkingSetSize.KERNEL32(?,00000E24,70E21FBB,00000000,00000000,00000000,00000000), ref: 056C289F
              Memory Dump Source
              • Source File: 00000000.00000002.4110079619.00000000056C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_56c0000_server.jbxd
              Similarity
              • API ID: ProcessSizeWorking
              • String ID:
              • API String ID: 3584180929-0
              • Opcode ID: 541c3383d8f8f9df07ef9d52ff662e343f73c9ff05881f7d816cb4df65f83bde
              • Instruction ID: d86325df2161823c6fc3e634c2d9685a728593ea2edef8fb10a20455313dfbce
              • Opcode Fuzzy Hash: 541c3383d8f8f9df07ef9d52ff662e343f73c9ff05881f7d816cb4df65f83bde
              • Instruction Fuzzy Hash: 6921D7755053806FE722CB15DC54FA6BFB8EF45210F0889ABE944DB652D374A908CBB1
              APIs
              • GetProcessWorkingSetSize.KERNEL32(?,00000E24,70E21FBB,00000000,00000000,00000000,00000000), ref: 056C27BB
              Memory Dump Source
              • Source File: 00000000.00000002.4110079619.00000000056C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_56c0000_server.jbxd
              Similarity
              • API ID: ProcessSizeWorking
              • String ID:
              • API String ID: 3584180929-0
              • Opcode ID: 541c3383d8f8f9df07ef9d52ff662e343f73c9ff05881f7d816cb4df65f83bde
              • Instruction ID: 6543dc46e74b950f72a6f370e7112f556bf8a6294be2c4dc3ccb796ce2aa20f4
              • Opcode Fuzzy Hash: 541c3383d8f8f9df07ef9d52ff662e343f73c9ff05881f7d816cb4df65f83bde
              • Instruction Fuzzy Hash: AB21D7715053806FE722CB15DC54FA7BFB8EF45210F0889AAE944CB652D374A908CB71
              APIs
              • SetErrorMode.KERNELBASE(?), ref: 016DAA44
              Memory Dump Source
              • Source File: 00000000.00000002.4102729661.00000000016DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 016DA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_16da000_server.jbxd
              Similarity
              • API ID: ErrorMode
              • String ID:
              • API String ID: 2340568224-0
              • Opcode ID: aeecdb993c10cb0717732e0dd93f566a3cee20ef60e39295a0cb7aa1a1fd591e
              • Instruction ID: 6e158c65e4f5b9ddc01d1f648128e52849708d25fdfeb69cdb931566ab7e6e86
              • Opcode Fuzzy Hash: aeecdb993c10cb0717732e0dd93f566a3cee20ef60e39295a0cb7aa1a1fd591e
              • Instruction Fuzzy Hash: C621897540E7C09FD7138B259C64A51BFB4EF17620F0E81DBD8848F6A3C2689808CB72
              APIs
              • GetFileType.KERNELBASE(?,00000E24,70E21FBB,00000000,00000000,00000000,00000000), ref: 016DACBD
              Memory Dump Source
              • Source File: 00000000.00000002.4102729661.00000000016DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 016DA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_16da000_server.jbxd
              Similarity
              • API ID: FileType
              • String ID:
              • API String ID: 3081899298-0
              • Opcode ID: 8bb1380323449e24b91321df922cce407008db63ec4661e397feb067e43ec7a8
              • Instruction ID: a9b71791f4540a74b1eb32c9c0763df4c9c0726ec0319637e40f9b91d4f1c0e2
              • Opcode Fuzzy Hash: 8bb1380323449e24b91321df922cce407008db63ec4661e397feb067e43ec7a8
              • Instruction Fuzzy Hash: C12105B54087806FE7228B55DC44BA6BFBCDF46324F0885DAE9848F293C364A909C771
              APIs
              • CreateMutexW.KERNELBASE(?,?), ref: 016DB0DD
              Memory Dump Source
              • Source File: 00000000.00000002.4102729661.00000000016DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 016DA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_16da000_server.jbxd
              Similarity
              • API ID: CreateMutex
              • String ID:
              • API String ID: 1964310414-0
              • Opcode ID: 63c2b70cf59327cc78d036402f5ceae19cb769bc5229140eeaf938270b39cadc
              • Instruction ID: 6a48e98c5a4b175c9b67184ff8ee6c28a824fb59032ec25e4ae87aec9b418a1c
              • Opcode Fuzzy Hash: 63c2b70cf59327cc78d036402f5ceae19cb769bc5229140eeaf938270b39cadc
              • Instruction Fuzzy Hash: 552192716002009FF720DF29DD85BA6FBE8EF09214F048869ED458B746D775E509CBB2
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.4102729661.00000000016DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 016DA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_16da000_server.jbxd
              Similarity
              • API ID: send
              • String ID:
              • API String ID: 2809346765-0
              • Opcode ID: 0a06291f8a84f5c6365d947800ca26c727bdcdf14fe53c61d96e2bea7cfa2d4a
              • Instruction ID: 0ddb5f42de1f6d115601b4b2e39de262de1211d44d55aa37dd843912bd94ee03
              • Opcode Fuzzy Hash: 0a06291f8a84f5c6365d947800ca26c727bdcdf14fe53c61d96e2bea7cfa2d4a
              • Instruction Fuzzy Hash: DB21B07250D7C09FD7238B21DC54A52BFB4EF07210F0989DBD9858F5A3D279A909CB62
              APIs
              • ioctlsocket.WS2_32(?,00000E24,70E21FBB,00000000,00000000,00000000,00000000), ref: 056C2233
              Memory Dump Source
              • Source File: 00000000.00000002.4110079619.00000000056C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_56c0000_server.jbxd
              Similarity
              • API ID: ioctlsocket
              • String ID:
              • API String ID: 3577187118-0
              • Opcode ID: cd1d8980cbafd003a4bf299a707e3a17a05d549d28c7ba67c98f12ebca8c709d
              • Instruction ID: 7cc3cb19bf14372eb36fe4570a1973d88d3e7787d6cdf7272463301fc94a8817
              • Opcode Fuzzy Hash: cd1d8980cbafd003a4bf299a707e3a17a05d549d28c7ba67c98f12ebca8c709d
              • Instruction Fuzzy Hash: 8921C3715093806FEB22CF54DC44FA6FFB8EF45210F0889AAE9859F652C374A908C7B1
              APIs
              • CopyFileW.KERNELBASE(?,?,?), ref: 016DB82A
              Memory Dump Source
              • Source File: 00000000.00000002.4102729661.00000000016DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 016DA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_16da000_server.jbxd
              Similarity
              • API ID: CopyFile
              • String ID:
              • API String ID: 1304948518-0
              • Opcode ID: 4f54014a051a7540a2ec1defd19f8044738efa08cef8c4cf905e4ed40698c8a7
              • Instruction ID: 8f8ee13921aed81f963da8d18354b99a1a83140a52c0d58863c41322cf07ae78
              • Opcode Fuzzy Hash: 4f54014a051a7540a2ec1defd19f8044738efa08cef8c4cf905e4ed40698c8a7
              • Instruction Fuzzy Hash: D42181716093805FEB228F29DC55B52BFF8EF06610F0984DAED85DB252D225E804CB61
              APIs
              • RegQueryValueExW.KERNELBASE(?,00000E24,70E21FBB,00000000,00000000,00000000,00000000), ref: 016DB394
              Memory Dump Source
              • Source File: 00000000.00000002.4102729661.00000000016DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 016DA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_16da000_server.jbxd
              Similarity
              • API ID: QueryValue
              • String ID:
              • API String ID: 3660427363-0
              • Opcode ID: 9acf85f574661e8fa894dff3beab4be1b9749e5be01512dadc893a76ea5c986f
              • Instruction ID: aa9f650f6c28301086af927bfcc4854f0b9b380193b7093a4c9e1321ed86041a
              • Opcode Fuzzy Hash: 9acf85f574661e8fa894dff3beab4be1b9749e5be01512dadc893a76ea5c986f
              • Instruction Fuzzy Hash: 81219D76A00700AEE721CE59DC44FA6BBECEF05610F09856AED458B755DB70E908CAB1
              APIs
              • WSAConnect.WS2_32(?,?,?,?,?,?,?), ref: 056C1486
              Memory Dump Source
              • Source File: 00000000.00000002.4110079619.00000000056C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_56c0000_server.jbxd
              Similarity
              • API ID: Connect
              • String ID:
              • API String ID: 3144859779-0
              • Opcode ID: 26dc931036a28539eb15fb5bc4889bb3ff73beeea2fc83aec2368703136bb6ee
              • Instruction ID: 77aa586aaa84a333a4b5d9bf98abaaef2a742f731b87ea439a18313b10242c3c
              • Opcode Fuzzy Hash: 26dc931036a28539eb15fb5bc4889bb3ff73beeea2fc83aec2368703136bb6ee
              • Instruction Fuzzy Hash: 1A21B3711097809FDB228F60DC44A66BFF4EF06310F0985DAE9858F663D379A909DB61
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.4110079619.00000000056C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_56c0000_server.jbxd
              Similarity
              • API ID: FileView
              • String ID:
              • API String ID: 3314676101-0
              • Opcode ID: 0e0714bbfd3920740e58dd06ed2e6da384a2a2eaffca5252b34e731d592e0b0f
              • Instruction ID: 1c425f876710d843097b31d0d0bbeb86f8eeb3cf7de1a1bf078712d714f4acde
              • Opcode Fuzzy Hash: 0e0714bbfd3920740e58dd06ed2e6da384a2a2eaffca5252b34e731d592e0b0f
              • Instruction Fuzzy Hash: AF219F71500204AFE721CF19DD49FAAFBE8EF08224F0489ADE9458A651D375B548CBA1
              APIs
              • WSASocketW.WS2_32(?,?,?,?,?), ref: 056C0716
              Memory Dump Source
              • Source File: 00000000.00000002.4110079619.00000000056C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_56c0000_server.jbxd
              Similarity
              • API ID: Socket
              • String ID:
              • API String ID: 38366605-0
              • Opcode ID: 0682968836bcc361dba87713e618170f057f2554f7877de12a281d09dcfdb832
              • Instruction ID: 73e72a7b86945daa5747ee1d873ee837280a1279097c621fb9ae0c82f7c67e48
              • Opcode Fuzzy Hash: 0682968836bcc361dba87713e618170f057f2554f7877de12a281d09dcfdb832
              • Instruction Fuzzy Hash: BB21C271500200AFEB21DF59DD49FAAFBE8EF08220F0489ADE9458A651C375A508CBB1
              APIs
              • LoadLibraryA.KERNELBASE(?,00000E24), ref: 056C174F
              Memory Dump Source
              • Source File: 00000000.00000002.4110079619.00000000056C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_56c0000_server.jbxd
              Similarity
              • API ID: LibraryLoad
              • String ID:
              • API String ID: 1029625771-0
              • Opcode ID: 282eea78483170635c41bf4070d232d0391a8b62f455fdc0629cce8d38fe136c
              • Instruction ID: 0b60b92b2bd93a9c989456e3c8086a16344d612e0a2688b7ad88cf8c3a8cce06
              • Opcode Fuzzy Hash: 282eea78483170635c41bf4070d232d0391a8b62f455fdc0629cce8d38fe136c
              • Instruction Fuzzy Hash: 1611E1711043406FE721CB15DC85FA6FFB8EF06320F08859AF9449B692C278A948CBA2
              APIs
              • SendMessageTimeoutA.USER32(?,00000E24), ref: 016DB571
              Memory Dump Source
              • Source File: 00000000.00000002.4102729661.00000000016DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 016DA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_16da000_server.jbxd
              Similarity
              • API ID: MessageSendTimeout
              • String ID:
              • API String ID: 1599653421-0
              • Opcode ID: db040bec374f31727e062dcfed683895800481a4b97d024a3e9750333045d284
              • Instruction ID: 16c894342d5bfe7ac2e856a5eda0387e44d12dece1823f0f7af4a4c445905837
              • Opcode Fuzzy Hash: db040bec374f31727e062dcfed683895800481a4b97d024a3e9750333045d284
              • Instruction Fuzzy Hash: D8212172500700AFEB318F14DD40FA6FBB8EF08310F04896AEE858A695C375E508CBB1
              APIs
              • RegQueryValueExW.KERNELBASE(?,00000E24,70E21FBB,00000000,00000000,00000000,00000000), ref: 056C0AD4
              Memory Dump Source
              • Source File: 00000000.00000002.4110079619.00000000056C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_56c0000_server.jbxd
              Similarity
              • API ID: QueryValue
              • String ID:
              • API String ID: 3660427363-0
              • Opcode ID: a0fe2f5e2c50bddbd4cacd3efd7d4e223dd09e464a8595841bbcb25912de9643
              • Instruction ID: 68ef3f0b8b165225d8f9814750451a61a7fae9cb467f9d319ef77399521c845e
              • Opcode Fuzzy Hash: a0fe2f5e2c50bddbd4cacd3efd7d4e223dd09e464a8595841bbcb25912de9643
              • Instruction Fuzzy Hash: EF110272504700AFE730CF55CD48FAAFBE8EF04324F0885AAE9428A742C731E508CAB1
              APIs
              • RegSetValueExW.KERNELBASE(?,00000E24,70E21FBB,00000000,00000000,00000000,00000000), ref: 016DB480
              Memory Dump Source
              • Source File: 00000000.00000002.4102729661.00000000016DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 016DA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_16da000_server.jbxd
              Similarity
              • API ID: Value
              • String ID:
              • API String ID: 3702945584-0
              • Opcode ID: 283f6a8f1c05ee33ed544a5afaa8332567a146dd2d3d2ba1d6db88158a59ecb4
              • Instruction ID: d7468f00f476585e7889129992b380e1524762350ece3736f113af086b01b5db
              • Opcode Fuzzy Hash: 283f6a8f1c05ee33ed544a5afaa8332567a146dd2d3d2ba1d6db88158a59ecb4
              • Instruction Fuzzy Hash: 4C11E476A00700AFE731CE09DC44FA6FBECEF04214F04856AEE418A746D374E8088AB1
              APIs
              • GetProcessTimes.KERNELBASE(?,00000E24,70E21FBB,00000000,00000000,00000000,00000000), ref: 056C12C9
              Memory Dump Source
              • Source File: 00000000.00000002.4110079619.00000000056C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_56c0000_server.jbxd
              Similarity
              • API ID: ProcessTimes
              • String ID:
              • API String ID: 1995159646-0
              • Opcode ID: 55cb7750561127922967d0a5203135e6df3fa8303b54edfda8a593eed1fea60b
              • Instruction ID: 1fb299f04d97f0ccc947786b1e5cfbd7eef6a2b2a488d353ddd1fcea0eb3592d
              • Opcode Fuzzy Hash: 55cb7750561127922967d0a5203135e6df3fa8303b54edfda8a593eed1fea60b
              • Instruction Fuzzy Hash: 3911B472600600AFE7318F55DD44FAABBE8EF05214F04896AE9458A651D375E548CBB1
              APIs
              • GetProcessWorkingSetSize.KERNEL32(?,00000E24,70E21FBB,00000000,00000000,00000000,00000000), ref: 056C27BB
              Memory Dump Source
              • Source File: 00000000.00000002.4110079619.00000000056C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_56c0000_server.jbxd
              Similarity
              • API ID: ProcessSizeWorking
              • String ID:
              • API String ID: 3584180929-0
              • Opcode ID: 849a3c4f8c1f552369b47d6b5ddc5855a6f4e1489ebac756628c4e5caf3b43e4
              • Instruction ID: e9443e5373410c311858834f7406c0d301872530f0dd7cc2dbd0a8998fe8acbe
              • Opcode Fuzzy Hash: 849a3c4f8c1f552369b47d6b5ddc5855a6f4e1489ebac756628c4e5caf3b43e4
              • Instruction Fuzzy Hash: B51108756003009FE721CF18DD84FBAFBA8EF04314F0488AAED45CB641D774A908CAB1
              APIs
              • SetProcessWorkingSetSize.KERNEL32(?,00000E24,70E21FBB,00000000,00000000,00000000,00000000), ref: 056C289F
              Memory Dump Source
              • Source File: 00000000.00000002.4110079619.00000000056C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_56c0000_server.jbxd
              Similarity
              • API ID: ProcessSizeWorking
              • String ID:
              • API String ID: 3584180929-0
              • Opcode ID: 849a3c4f8c1f552369b47d6b5ddc5855a6f4e1489ebac756628c4e5caf3b43e4
              • Instruction ID: d5ebe1a4f2c6f2a96fc04c92bdbf3cf85ade1583b3d8570a9297997bf00f1e6b
              • Opcode Fuzzy Hash: 849a3c4f8c1f552369b47d6b5ddc5855a6f4e1489ebac756628c4e5caf3b43e4
              • Instruction Fuzzy Hash: E3110475600300AFEB21CF18DD44FBAFBA8EF04720F0489AAED45CB641D374A908CAB1
              APIs
              • GetExitCodeProcess.KERNELBASE(?,00000E24,70E21FBB,00000000,00000000,00000000,00000000), ref: 056C26DC
              Memory Dump Source
              • Source File: 00000000.00000002.4110079619.00000000056C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_56c0000_server.jbxd
              Similarity
              • API ID: CodeExitProcess
              • String ID:
              • API String ID: 3861947596-0
              • Opcode ID: 58a25219b0210f77a4ba0b1c189f991114debfa10e795a3dde2e9848208b0590
              • Instruction ID: d3b5b30294db7e3e062164d76eab6ba148e0dc7e57b8d94af24e23f3574cfa08
              • Opcode Fuzzy Hash: 58a25219b0210f77a4ba0b1c189f991114debfa10e795a3dde2e9848208b0590
              • Instruction Fuzzy Hash: 7A11EB756003049FE721CB19DD45BBABB98EF04224F1484AAED45CB741D7749944CAB1
              APIs
              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 016DA5DE
              Memory Dump Source
              • Source File: 00000000.00000002.4102729661.00000000016DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 016DA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_16da000_server.jbxd
              Similarity
              • API ID: DuplicateHandle
              • String ID:
              • API String ID: 3793708945-0
              • Opcode ID: 76c7012636e15995625ecf4bc77ab7a42a0edf18ded14d44aec10cae2abfd743
              • Instruction ID: eac6c12d2b4b6963633c01d98ad8c7b7a23413eb80b0dfc143fd6f7545304c59
              • Opcode Fuzzy Hash: 76c7012636e15995625ecf4bc77ab7a42a0edf18ded14d44aec10cae2abfd743
              • Instruction Fuzzy Hash: 0611B471408780AFDB228F54DC44A62FFF8EF4A310F0889DAED858B663C335A518DB61
              APIs
              • ReadFile.KERNELBASE(?,00000E24,70E21FBB,00000000,00000000,00000000,00000000), ref: 016DAF0D
              Memory Dump Source
              • Source File: 00000000.00000002.4102729661.00000000016DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 016DA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_16da000_server.jbxd
              Similarity
              • API ID: FileRead
              • String ID:
              • API String ID: 2738559852-0
              • Opcode ID: 3f17e35a418e49b3d38583e177bef83f4d57315be3759469bc2967d18e26d003
              • Instruction ID: 9ea248e7ee8a1e9da97327b199e6f421f680fb3654d1da9094069847da705c8a
              • Opcode Fuzzy Hash: 3f17e35a418e49b3d38583e177bef83f4d57315be3759469bc2967d18e26d003
              • Instruction Fuzzy Hash: 4511B671504700AFE7318F59DD44FA6FBE8EF04314F0489AAED459B655C375E5088BB1
              APIs
              • DeleteFileW.KERNELBASE(?), ref: 016DB8E4
              Memory Dump Source
              • Source File: 00000000.00000002.4102729661.00000000016DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 016DA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_16da000_server.jbxd
              Similarity
              • API ID: DeleteFile
              • String ID:
              • API String ID: 4033686569-0
              • Opcode ID: e813d960454c38bebc406314a083ac6a340177ec99a722282e7319c9510c5b79
              • Instruction ID: 1878d7b63ce2da673cfdadbe0d1c764997cfa8e9133c1bcf2a1916a4051ac644
              • Opcode Fuzzy Hash: e813d960454c38bebc406314a083ac6a340177ec99a722282e7319c9510c5b79
              • Instruction Fuzzy Hash: 5411B6719097805FD711CB25DC45B56BFE8EF46220F0984EAED85CF257D234E948CB61
              APIs
              • ioctlsocket.WS2_32(?,00000E24,70E21FBB,00000000,00000000,00000000,00000000), ref: 056C2233
              Memory Dump Source
              • Source File: 00000000.00000002.4110079619.00000000056C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_56c0000_server.jbxd
              Similarity
              • API ID: ioctlsocket
              • String ID:
              • API String ID: 3577187118-0
              • Opcode ID: d26ac4b22672dbd748befd67638e623952c18e311a6b90670833273587d2ff83
              • Instruction ID: ea14940b2a077b4e995358631435bb5cf049759104538dd48d75aa4b26bd9f8e
              • Opcode Fuzzy Hash: d26ac4b22672dbd748befd67638e623952c18e311a6b90670833273587d2ff83
              • Instruction Fuzzy Hash: 8411E775500300AFEB31CF54DD44FB6FBA8EF44724F0489AAED459B645C379A508CAB1
              APIs
              • LoadLibraryA.KERNELBASE(?,00000E24), ref: 056C174F
              Memory Dump Source
              • Source File: 00000000.00000002.4110079619.00000000056C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_56c0000_server.jbxd
              Similarity
              • API ID: LibraryLoad
              • String ID:
              • API String ID: 1029625771-0
              • Opcode ID: cf31b4870bc4b68bc83e176020ed624e8da080f5733b5dacbb8fad310f0c6892
              • Instruction ID: bfe4cc6062c74894ab4bd58dc4208207906b83e7434bc096d8b10bb2d059d653
              • Opcode Fuzzy Hash: cf31b4870bc4b68bc83e176020ed624e8da080f5733b5dacbb8fad310f0c6892
              • Instruction Fuzzy Hash: 53112931100300AFF730CB19DD85FB6FBA8DF09720F1485AAED054A781C375A948CAB5
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.4110079619.00000000056C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_56c0000_server.jbxd
              Similarity
              • API ID: select
              • String ID:
              • API String ID: 1274211008-0
              • Opcode ID: 3654133c1e66779ffa33dd5e087a46b4b7283e349c0a442d0c03ff9c8ebbe300
              • Instruction ID: cb07a7b3f7066961833f049c81eabb043dde11631157551ad73db7569b881d31
              • Opcode Fuzzy Hash: 3654133c1e66779ffa33dd5e087a46b4b7283e349c0a442d0c03ff9c8ebbe300
              • Instruction Fuzzy Hash: 0A1160756046048FD720CF15D884F66FBE8EF08610F0885AADD8ACB755D335E544CB71
              APIs
              • CopyFileW.KERNELBASE(?,?,?), ref: 016DB82A
              Memory Dump Source
              • Source File: 00000000.00000002.4102729661.00000000016DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 016DA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_16da000_server.jbxd
              Similarity
              • API ID: CopyFile
              • String ID:
              • API String ID: 1304948518-0
              • Opcode ID: 0e74fd793193f12e13eaa8ecfdfe1feb493f29f6f2925ce5883fcffdbd66c755
              • Instruction ID: 670e5e3b1055069931b10660bb4f47b7b034e0e8c25e098347b59eb33a7b9a3a
              • Opcode Fuzzy Hash: 0e74fd793193f12e13eaa8ecfdfe1feb493f29f6f2925ce5883fcffdbd66c755
              • Instruction Fuzzy Hash: C5118271A006008FEB20CF19DC85B56FBE8EF05610F09C4AADD45CB756D775D404CAA1
              APIs
              • GetFileType.KERNELBASE(?,00000E24,70E21FBB,00000000,00000000,00000000,00000000), ref: 016DACBD
              Memory Dump Source
              • Source File: 00000000.00000002.4102729661.00000000016DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 016DA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_16da000_server.jbxd
              Similarity
              • API ID: FileType
              • String ID:
              • API String ID: 3081899298-0
              • Opcode ID: 9da019d5438edbb268878f0f048d3de995d809fd557376e2ff92fedbeb3f750e
              • Instruction ID: 94cea4b4f6a4773733c7647698202646c5e62e1fb130347c393902e7d3863e53
              • Opcode Fuzzy Hash: 9da019d5438edbb268878f0f048d3de995d809fd557376e2ff92fedbeb3f750e
              • Instruction Fuzzy Hash: 77012671504300AFE721CB49DD85BA6F7A8DF04224F04C5A6EE058B741C374E9488AB1
              APIs
              • WSAConnect.WS2_32(?,?,?,?,?,?,?), ref: 056C1486
              Memory Dump Source
              • Source File: 00000000.00000002.4110079619.00000000056C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_56c0000_server.jbxd
              Similarity
              • API ID: Connect
              • String ID:
              • API String ID: 3144859779-0
              • Opcode ID: f716177271fb36693a26e6e514779b342e9972c3122ebb1101d18ca08dcc02d1
              • Instruction ID: 315dba5fffe843b77c03420fca66c554e54275ed34dc046d56423a661beaf855
              • Opcode Fuzzy Hash: f716177271fb36693a26e6e514779b342e9972c3122ebb1101d18ca08dcc02d1
              • Instruction Fuzzy Hash: FB1170315006049FEB20CF55D944B66FBE5FF09210F08CAEADD868B612D335E558DBA1
              APIs
              • DeleteFileW.KERNELBASE(?), ref: 016DB8E4
              Memory Dump Source
              • Source File: 00000000.00000002.4102729661.00000000016DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 016DA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_16da000_server.jbxd
              Similarity
              • API ID: DeleteFile
              • String ID:
              • API String ID: 4033686569-0
              • Opcode ID: d852d50cbd5158e0aa5a96434d50a92d666126aabfb235662b882eeb9abc3e87
              • Instruction ID: a3e9745fc72d158ef2408f68d88aa5ae00c98e8ef8f02a9dd25cbb9e1395322a
              • Opcode Fuzzy Hash: d852d50cbd5158e0aa5a96434d50a92d666126aabfb235662b882eeb9abc3e87
              • Instruction Fuzzy Hash: 49018071A006448FEB20CF29DD85766BBE8DF46220F0884AADD45CF746D379D544CAA1
              APIs
              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 016DA5DE
              Memory Dump Source
              • Source File: 00000000.00000002.4102729661.00000000016DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 016DA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_16da000_server.jbxd
              Similarity
              • API ID: DuplicateHandle
              • String ID:
              • API String ID: 3793708945-0
              • Opcode ID: 2bcee8e536fef6d4aa43ce2429bdb9e4392a5bcd529bb9f2fdd955477e648b1b
              • Instruction ID: 9c16f26c03da52860e76473dca1d0a8a1f38d3d1d8b4ebf4a6209f93970ad4c6
              • Opcode Fuzzy Hash: 2bcee8e536fef6d4aa43ce2429bdb9e4392a5bcd529bb9f2fdd955477e648b1b
              • Instruction Fuzzy Hash: 8D018E329046409FDB218F95DD44B66FBE0EF48210F0889AADE464B612C336A414DF62
              APIs
              • RegQueryValueExW.KERNELBASE(?,00000E24,?,?), ref: 056C065E
              Memory Dump Source
              • Source File: 00000000.00000002.4110079619.00000000056C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_56c0000_server.jbxd
              Similarity
              • API ID: QueryValue
              • String ID:
              • API String ID: 3660427363-0
              • Opcode ID: 32239ea9d4b8ead73c9d9761f128369b4e8d6910f859c06867f2ae940c437c24
              • Instruction ID: d678ddc19218d7aa1fa6e0f42f51c903313f9c3b4481a892fb51d860c80205ab
              • Opcode Fuzzy Hash: 32239ea9d4b8ead73c9d9761f128369b4e8d6910f859c06867f2ae940c437c24
              • Instruction Fuzzy Hash: 6101A7716006016BD250DF1ADD45F66FBF4FB88A20F148159DC085B741D771F515CBE5
              APIs
              • OleGetClipboard.OLE32(?,00000E24,?,?), ref: 016DA77E
              Memory Dump Source
              • Source File: 00000000.00000002.4102729661.00000000016DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 016DA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_16da000_server.jbxd
              Similarity
              • API ID: Clipboard
              • String ID:
              • API String ID: 220874293-0
              • Opcode ID: b14e249200b62c4608f59d667373a684f1fc4a0344be2582f3e2dd0a5e624bef
              • Instruction ID: 103d021aee3a3bef2afb5da1fa81f83571949ab4e0daee3f341e536add0b7e52
              • Opcode Fuzzy Hash: b14e249200b62c4608f59d667373a684f1fc4a0344be2582f3e2dd0a5e624bef
              • Instruction Fuzzy Hash: F401A7716006016BD250DF1ADD45F66FBF4FB88A20F148159DC085B741D731F515CBE5
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.4102729661.00000000016DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 016DA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_16da000_server.jbxd
              Similarity
              • API ID: send
              • String ID:
              • API String ID: 2809346765-0
              • Opcode ID: b4e9bf2c5b2e4407d857f0724e53afbaf66e6119c727208b8b72a0e2b4033bf6
              • Instruction ID: 9ac37a7df2b04fe61c5db41264556be384a8d9f29528946f1dd5923c564b33d3
              • Opcode Fuzzy Hash: b4e9bf2c5b2e4407d857f0724e53afbaf66e6119c727208b8b72a0e2b4033bf6
              • Instruction Fuzzy Hash: 0F01B5329046409FDB20CF59DD44B56FBE4EF48321F08C9AADD454B712C375A548CBA1
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.4109979889.0000000005590000.00000040.00000800.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5590000_server.jbxd
              Similarity
              • API ID:
              • String ID: 2k
              • API String ID: 0-1599061190
              • Opcode ID: 1e3ff8f52a04740ce3b21b95cd672523cfd785d7ed2fdf38331d0d178eaaf9ec
              • Instruction ID: 9491884da57dcc5ddb7acbcd3bea81aae727203ccba4bef0f6b3686ee8e41467
              • Opcode Fuzzy Hash: 1e3ff8f52a04740ce3b21b95cd672523cfd785d7ed2fdf38331d0d178eaaf9ec
              • Instruction Fuzzy Hash: 39A1BF307242118BEF28DB38D84576937A2FB8A755F244679E8229B3D0EB3DDD45CB90
              APIs
              • SetErrorMode.KERNELBASE(?), ref: 016DAA44
              Memory Dump Source
              • Source File: 00000000.00000002.4102729661.00000000016DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 016DA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_16da000_server.jbxd
              Similarity
              • API ID: ErrorMode
              • String ID:
              • API String ID: 2340568224-0
              • Opcode ID: c43eb8995d16d5b3e3040b18cbfb3ca936ce0c15316e4ddc1fffc5315abbaf7e
              • Instruction ID: 25af1d4f95a44e0dd305e0af3d029d95ffb0b16c0fc11d72f67d8b33db390d84
              • Opcode Fuzzy Hash: c43eb8995d16d5b3e3040b18cbfb3ca936ce0c15316e4ddc1fffc5315abbaf7e
              • Instruction Fuzzy Hash: 92F0F4319046408FDB208F49DE88765FBE0DF04220F0CC5AADD450B752C379A948CEA2
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.4109979889.0000000005590000.00000040.00000800.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5590000_server.jbxd
              Similarity
              • API ID:
              • String ID: 2k
              • API String ID: 0-1599061190
              • Opcode ID: 8feabe5b063aed94912c7992162f1b5525ec825ed0f282cd7b37899dac53486a
              • Instruction ID: b6368f4ab1162e971fc07de4392217a8db52e9827911cf61251d411687916efb
              • Opcode Fuzzy Hash: 8feabe5b063aed94912c7992162f1b5525ec825ed0f282cd7b37899dac53486a
              • Instruction Fuzzy Hash: B6813730A00218CFDB28DFB4C955BADB7B2FF85309F1045AAE10AAB294DB795D85CF51
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.4109979889.0000000005590000.00000040.00000800.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5590000_server.jbxd
              Similarity
              • API ID:
              • String ID: 2k
              • API String ID: 0-1599061190
              • Opcode ID: f7627adb6583585f177d417df809de655e9472d3b574253e336ca798cdfcd943
              • Instruction ID: 5c53707d90454894d0c624821de3d197b6c29cb2ce6dc6877d0f9b5f04601564
              • Opcode Fuzzy Hash: f7627adb6583585f177d417df809de655e9472d3b574253e336ca798cdfcd943
              • Instruction Fuzzy Hash: 6B413934A00218CFDB28DBB5C955BECB7F2BF85309F5045A9D00AAB294DB794E85CF51
              APIs
              • CloseHandle.KERNELBASE(?), ref: 016DABF0
              Memory Dump Source
              • Source File: 00000000.00000002.4102729661.00000000016DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 016DA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_16da000_server.jbxd
              Similarity
              • API ID: CloseHandle
              • String ID:
              • API String ID: 2962429428-0
              • Opcode ID: d9e7155514662d07354713b2f27c7cfd7a41c9e431fbe1bd065c50998c7274f0
              • Instruction ID: b8fa749c8dcd24fbdaecf7a30b111566c2bb96ab4eff64c814bcf13253ed589b
              • Opcode Fuzzy Hash: d9e7155514662d07354713b2f27c7cfd7a41c9e431fbe1bd065c50998c7274f0
              • Instruction Fuzzy Hash: 4421F3719097809FD7128F29ED95752BFB8EF06220F0985DAED858F2A3D2349908CB61
              APIs
              • CloseHandle.KERNELBASE(?), ref: 016DA690
              Memory Dump Source
              • Source File: 00000000.00000002.4102729661.00000000016DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 016DA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_16da000_server.jbxd
              Similarity
              • API ID: CloseHandle
              • String ID:
              • API String ID: 2962429428-0
              • Opcode ID: 193245239c5a9fb0b3206371bd5ce9ef90722b97d291806c2364d065074e8a6d
              • Instruction ID: d1395c6a6237facc29945f90209250d15d556e62a1ad5a5dd29549dcd00eae61
              • Opcode Fuzzy Hash: 193245239c5a9fb0b3206371bd5ce9ef90722b97d291806c2364d065074e8a6d
              • Instruction Fuzzy Hash: 1521387150D3C09FDB128B259D94A52BFB4DF47220F0984DADD849F2A3D2699908CBB2
              APIs
              • CloseHandle.KERNELBASE(?), ref: 016DABF0
              Memory Dump Source
              • Source File: 00000000.00000002.4102729661.00000000016DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 016DA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_16da000_server.jbxd
              Similarity
              • API ID: CloseHandle
              • String ID:
              • API String ID: 2962429428-0
              • Opcode ID: 167519f3adfe75f8658f5ee689cd761ecb1cacbdc5d111da9143ee260b1b1235
              • Instruction ID: c53334746e982503bc63749bba4d985673c3a14c949029af702ccacd003a9164
              • Opcode Fuzzy Hash: 167519f3adfe75f8658f5ee689cd761ecb1cacbdc5d111da9143ee260b1b1235
              • Instruction Fuzzy Hash: 6A018471A086448FEB208F59ED85765FBE4DF04220F08C8AADD458F756D379D544CAA1
              APIs
              • CloseHandle.KERNELBASE(?), ref: 016DA690
              Memory Dump Source
              • Source File: 00000000.00000002.4102729661.00000000016DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 016DA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_16da000_server.jbxd
              Similarity
              • API ID: CloseHandle
              • String ID:
              • API String ID: 2962429428-0
              • Opcode ID: 0e7c62978d6b2146a5d7a3098f176e767a047f2e4ea66a3998f21ab52cd97649
              • Instruction ID: 6986fa46c76419ebeb5ce97b4c149b7dbe8e6173f40dbd194dc5f8c8b745eb97
              • Opcode Fuzzy Hash: 0e7c62978d6b2146a5d7a3098f176e767a047f2e4ea66a3998f21ab52cd97649
              • Instruction Fuzzy Hash: 1D01D671904240CFEB20CF59DD88765FBE4DF44220F08C8AADD498F756D379A544CEA2
              Memory Dump Source
              • Source File: 00000000.00000002.4109979889.0000000005590000.00000040.00000800.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5590000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b85ec89b6efbe74b9f1a13bb0d775cf1bfdccaacc27226b2491339ddb7ee6428
              • Instruction ID: 16fe6402c4e80f1ae54c0657a29495ca46c219c959257af1183b79aacd42b1ff
              • Opcode Fuzzy Hash: b85ec89b6efbe74b9f1a13bb0d775cf1bfdccaacc27226b2491339ddb7ee6428
              • Instruction Fuzzy Hash: 26C27E34700265CBEF258B28D9107B97BB6FB4DB15F0044AB984997B80DB3C9DA5DFA0
              Memory Dump Source
              • Source File: 00000000.00000002.4109979889.0000000005590000.00000040.00000800.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5590000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e816c2167fefc072af408f4bb6646405e70b4eefe7428a55ee72286c7d3da346
              • Instruction ID: 4e2dd024b90568499ac9d41504102777fd5efb4254cea2a51ef605b3cced85c5
              • Opcode Fuzzy Hash: e816c2167fefc072af408f4bb6646405e70b4eefe7428a55ee72286c7d3da346
              • Instruction Fuzzy Hash: F692B5347002649BEF258B28D9107B937B7FB4EB15F0444AB948997B84CB3C9DA5EF90
              Memory Dump Source
              • Source File: 00000000.00000002.4109979889.0000000005590000.00000040.00000800.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5590000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e43e113a368d9c6c9b7d514d3b84b9295957db257646b3e4153f4f16fca260b0
              • Instruction ID: 6ef9203878ec9a64a80be2eaa869c3e5cc7e59258a0674ac601edc6f19d5b405
              • Opcode Fuzzy Hash: e43e113a368d9c6c9b7d514d3b84b9295957db257646b3e4153f4f16fca260b0
              • Instruction Fuzzy Hash: A392C5347002649BEF258B28D9107B937B7FB4EB15F0444AB948997B84CB3C9DA5EF90
              Memory Dump Source
              • Source File: 00000000.00000002.4109979889.0000000005590000.00000040.00000800.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5590000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9f0e2ea1912d0ff19d2d5fcdb649f60154e76b196bb07fb8e626dfa35355f058
              • Instruction ID: 639de2f9121aa3eb11dd2e522a7787bf14a9b1fb7850298cd94eac20ca6a5aa5
              • Opcode Fuzzy Hash: 9f0e2ea1912d0ff19d2d5fcdb649f60154e76b196bb07fb8e626dfa35355f058
              • Instruction Fuzzy Hash: 7A92B5347002649BEF258B28D9107B937B7FB4EB15F0444AB948997B84CB3C9DA5EF90
              Memory Dump Source
              • Source File: 00000000.00000002.4109979889.0000000005590000.00000040.00000800.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5590000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f9bca38a7b9201e1983765bd4d3cf50fa98a2015ee618f2d4fe2d31cb579613e
              • Instruction ID: efa00f8b6c0dfe30655051d9e5749084208d5ab52512e0b9054eb41c530aa794
              • Opcode Fuzzy Hash: f9bca38a7b9201e1983765bd4d3cf50fa98a2015ee618f2d4fe2d31cb579613e
              • Instruction Fuzzy Hash: 65D13834B00214AFDF09DFB4E8515AD77B2FF88659B60852AE416973A4DF3D9C02CB90
              Memory Dump Source
              • Source File: 00000000.00000002.4109979889.0000000005590000.00000040.00000800.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5590000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e40c62794a607664335839348cb121d6d64b7b6e4feffbc08a355fbeb753c096
              • Instruction ID: a9a5b427d480a6b204f9ebc8759306d19ba51a1de76864ac35c35b6e31b55a05
              • Opcode Fuzzy Hash: e40c62794a607664335839348cb121d6d64b7b6e4feffbc08a355fbeb753c096
              • Instruction Fuzzy Hash: F4A11734B00214DFDB19DBB4E8516AD77B2FF88659B60852AE416973A4DF3D9C12CF80
              Memory Dump Source
              • Source File: 00000000.00000002.4109979889.0000000005590000.00000040.00000800.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5590000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 982f0d6bafd1e8eb0db7c83ce3372560c31596b32990fe83e2a6763cf61d863d
              • Instruction ID: d46f71cedcd1657e07a13c0e6e4cfac3944dfef0d00fb5a25ddd7e212b1e006f
              • Opcode Fuzzy Hash: 982f0d6bafd1e8eb0db7c83ce3372560c31596b32990fe83e2a6763cf61d863d
              • Instruction Fuzzy Hash: F2913734B00214EFDB19DBB4E8516AD77B2FF88659B60852AE4169B3A4DF3D9C01CF80
              Memory Dump Source
              • Source File: 00000000.00000002.4109979889.0000000005590000.00000040.00000800.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5590000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 337a413bdc29711d49bf4f936f0bc0c7e9b2fa729b4601b9fd06c13ada587c25
              • Instruction ID: 673fcc5e157218098fa379a71800d46e4558673ece05ee9bac8d1e9a815afb4d
              • Opcode Fuzzy Hash: 337a413bdc29711d49bf4f936f0bc0c7e9b2fa729b4601b9fd06c13ada587c25
              • Instruction Fuzzy Hash: 70912834B00214EFDB19DBB4E451AAD77B2FF88619B60852AE416973A4DF3D9C51CF80
              Memory Dump Source
              • Source File: 00000000.00000002.4109979889.0000000005590000.00000040.00000800.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5590000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 8e717b9f06db6dca50a54ac7540204bb17671f286bfa3ee5845cffc33db6f3c7
              • Instruction ID: 7ef108cc626b27896a98db4eeec231edf64dac4bf407bae7aa870d58460f4043
              • Opcode Fuzzy Hash: 8e717b9f06db6dca50a54ac7540204bb17671f286bfa3ee5845cffc33db6f3c7
              • Instruction Fuzzy Hash: 01812834B00214DFDB19DBB4E851AAD77B2FF88619B60852AE416973A4DF3D9C51CF80
              Memory Dump Source
              • Source File: 00000000.00000002.4109979889.0000000005590000.00000040.00000800.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5590000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a8576ed9ed4f28670f3d50a5a4f639bf13e60da63b097584a8e78626993c14b5
              • Instruction ID: fcdfccadb117ab2a4f9d78628d76026d171d06f28f1686b66fd64314ebb4092c
              • Opcode Fuzzy Hash: a8576ed9ed4f28670f3d50a5a4f639bf13e60da63b097584a8e78626993c14b5
              • Instruction Fuzzy Hash: 43713934B00214DFDB199B74E45166D73B2FF88619B60852AE856977A4DF3D9C41CB80
              Memory Dump Source
              • Source File: 00000000.00000002.4109979889.0000000005590000.00000040.00000800.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5590000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: cbe3ce1e36c0b0de26aaa6089af4c1076af1bae135597bdc220fb767e205be5f
              • Instruction ID: 86eec89d5e728e8bb408e31f4a73c04d37e43836d5df607d044de38adc517b77
              • Opcode Fuzzy Hash: cbe3ce1e36c0b0de26aaa6089af4c1076af1bae135597bdc220fb767e205be5f
              • Instruction Fuzzy Hash: D951B0306242019FEF29CB76D8017A97BE2FB4A355F5882A6E412DB2D0DB3DD906CB50
              Memory Dump Source
              • Source File: 00000000.00000002.4109979889.0000000005590000.00000040.00000800.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5590000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 26baa72451ab54d08b589085ca470d76ecdfc9db60f96e9bbd5c9ba2e814f5c6
              • Instruction ID: 99d0f982ea85eaef85d3ae2d6fddc890c10ca66aae8d1f2f81e4b60b577f8033
              • Opcode Fuzzy Hash: 26baa72451ab54d08b589085ca470d76ecdfc9db60f96e9bbd5c9ba2e814f5c6
              • Instruction Fuzzy Hash: 7141B1307242019BEF28CB7698017A876E2FB4A755F5886A6E452DB2D0EF3DDD06CB50
              Memory Dump Source
              • Source File: 00000000.00000002.4109979889.0000000005590000.00000040.00000800.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5590000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 4e6ff146bb1bcf16bdfd2f2c8eebad9ee67fc07573f2adb755a51dce198864da
              • Instruction ID: 7318d953f1cfc49ebee562789aea5801612fd1ba315d415d1143ced25242aba7
              • Opcode Fuzzy Hash: 4e6ff146bb1bcf16bdfd2f2c8eebad9ee67fc07573f2adb755a51dce198864da
              • Instruction Fuzzy Hash: 8931D030B002118FDB14AB78D8167BE73AAEB88619F50483A9505977E0EF3DAD5A87D1
              Memory Dump Source
              • Source File: 00000000.00000002.4109979889.0000000005590000.00000040.00000800.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5590000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 61e6ae906e308cd7a02b2e1af002e8e1107a779180c4f72fff5e372aa06dc7a6
              • Instruction ID: ccdb8755c9c109da19ed053348d1018e8a2708834bd31b2b800e62c1b33a2f0c
              • Opcode Fuzzy Hash: 61e6ae906e308cd7a02b2e1af002e8e1107a779180c4f72fff5e372aa06dc7a6
              • Instruction Fuzzy Hash: D2319E30B002059FEF18CF79D954BAEBBF6BF88614F144169E405AB390CB7898058B90
              Memory Dump Source
              • Source File: 00000000.00000002.4110433573.0000000005DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5da0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ccb2c64fae894b0f47bdbac10bb9a1e83ab87043d313420dcd8eb49ac2f0cd2b
              • Instruction ID: 71266d7f385fcea9409e0e62b03e1e7064620909afe52e118e25ecd0b867e38d
              • Opcode Fuzzy Hash: ccb2c64fae894b0f47bdbac10bb9a1e83ab87043d313420dcd8eb49ac2f0cd2b
              • Instruction Fuzzy Hash: 1F11EAB5A08301AFD350CF19D840A5BFBE4FB88664F04896EF898D7311D335EA048FA2
              Memory Dump Source
              • Source File: 00000000.00000002.4109979889.0000000005590000.00000040.00000800.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5590000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 970be781275606e47e967af5e2f68b3077f234ef6dffd0447c4e0a8e070417f9
              • Instruction ID: 3867ab29ac7da5b2625f479640ac8d0b24a858fd967bf8805724052e20d92b63
              • Opcode Fuzzy Hash: 970be781275606e47e967af5e2f68b3077f234ef6dffd0447c4e0a8e070417f9
              • Instruction Fuzzy Hash: FD119E71F002149FCB64DBBCD8451AEBBF6EB89254720857ED805E7750EB398D02CB90
              Memory Dump Source
              • Source File: 00000000.00000002.4102697463.00000000016C0000.00000040.00000020.00020000.00000000.sdmp, Offset: 016C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_16c0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 6b20f7e0f0de97eda7ee24dec44a6bbfc3db618ef2b902fe63f76c4f6cfa2865
              • Instruction ID: 288db6e5a15b361fa1b3072fb052fd198e226f5d36a01cc8c7f7ff7fd801e35a
              • Opcode Fuzzy Hash: 6b20f7e0f0de97eda7ee24dec44a6bbfc3db618ef2b902fe63f76c4f6cfa2865
              • Instruction Fuzzy Hash: 2011E438205240DFDB11CB14D944B27BBA5EB88B08F24C9ACF9490B743C77BD843CA91
              Memory Dump Source
              • Source File: 00000000.00000002.4109979889.0000000005590000.00000040.00000800.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5590000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 72e9afa61e3112de9ef5c61ea35c2da38e68faa7c8c640f8ab3f7fec87b39972
              • Instruction ID: 3f172bc13aa6faff08b86d0f0d1a33a190d7b51ed12568642c39d919a8ca6806
              • Opcode Fuzzy Hash: 72e9afa61e3112de9ef5c61ea35c2da38e68faa7c8c640f8ab3f7fec87b39972
              • Instruction Fuzzy Hash: 1611D72244E3C04FE3138B64DC66A803FB0AF57625B4E45DBD480CF2A7D66C985DD762
              Memory Dump Source
              • Source File: 00000000.00000002.4110433573.0000000005DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5da0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 536c369048865a57d0da1b9f29e937f0c066e4c5a63df0f1109efde2f569147b
              • Instruction ID: 2ab9819f695f1707dd51ed07aede484120881c470a3c3d119da114792166345d
              • Opcode Fuzzy Hash: 536c369048865a57d0da1b9f29e937f0c066e4c5a63df0f1109efde2f569147b
              • Instruction Fuzzy Hash: 3A11ECB5A08301AFD350CF09DC44E5BFBE8EB88660F14892EF95997311D235E9088BA2
              Memory Dump Source
              • Source File: 00000000.00000002.4102778536.00000000016EA000.00000040.00000800.00020000.00000000.sdmp, Offset: 016EA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_16ea000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: c03d77769cc7df6b33ecccbde006f9a7f2e6a5bea97d7b0fbfb942d7fab02272
              • Instruction ID: 0844c0a68150ad6743fcfc854930d0f53ce984407c38670fe0f6343758af3eb1
              • Opcode Fuzzy Hash: c03d77769cc7df6b33ecccbde006f9a7f2e6a5bea97d7b0fbfb942d7fab02272
              • Instruction Fuzzy Hash: 8B11ECB5A08301AFD350CF09DC44E5BFBE8EB88660F14892EF95997311D235E9088FA2
              Memory Dump Source
              • Source File: 00000000.00000002.4102697463.00000000016C0000.00000040.00000020.00020000.00000000.sdmp, Offset: 016C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_16c0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2537a1758fff32841c58f6ccf4aba8e2f359e061325d61847d11c5e441c5bdfa
              • Instruction ID: 1237f5200567f0cff965edbe5cbc5fccd7b12324b91bdb6e8dd48e7105b37f28
              • Opcode Fuzzy Hash: 2537a1758fff32841c58f6ccf4aba8e2f359e061325d61847d11c5e441c5bdfa
              • Instruction Fuzzy Hash: FFF0A97650D7806FD7118B05AC55863FFB8DF86530709C5EFEC498B752D229A908CBB2
              Memory Dump Source
              • Source File: 00000000.00000002.4102697463.00000000016C0000.00000040.00000020.00020000.00000000.sdmp, Offset: 016C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_16c0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a7e5788c7ee035bdb9d227f0878be9ef3109826bccc91f5837b7b8d485c4c06e
              • Instruction ID: 085d9e47958c6e247cd67bb5261c4a309778deace4656445b4ca60654dce94f1
              • Opcode Fuzzy Hash: a7e5788c7ee035bdb9d227f0878be9ef3109826bccc91f5837b7b8d485c4c06e
              • Instruction Fuzzy Hash: BF117335109380CFCB12CB10C950B15BFB1EB86604F19C6EEE4894B693C33A8806CB41
              Memory Dump Source
              • Source File: 00000000.00000002.4109979889.0000000005590000.00000040.00000800.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5590000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9959d7f729bb74c4670d69ed4ae9686175a803d81e3747007de2d268c8718176
              • Instruction ID: fd903ebcb5732ecdd4129912859036ff8f2920343ba4384ddb643cb76dea55a0
              • Opcode Fuzzy Hash: 9959d7f729bb74c4670d69ed4ae9686175a803d81e3747007de2d268c8718176
              • Instruction Fuzzy Hash: E411273461A2428FCB20EF38D95C54D7BE2ABC4619B04892CE585CB619EF389848DB82
              Memory Dump Source
              • Source File: 00000000.00000002.4109979889.0000000005590000.00000040.00000800.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5590000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b1dd28c1cd2c22da2f8acf683e8aec349ef9e6ed8118fa8df1c0c28c6b962ddf
              • Instruction ID: 6b94e34c2553f516c81520ec97c8a7f74836f2fa099f927d4121512da5660458
              • Opcode Fuzzy Hash: b1dd28c1cd2c22da2f8acf683e8aec349ef9e6ed8118fa8df1c0c28c6b962ddf
              • Instruction Fuzzy Hash: FDF0C232A013046BEB04DFB1CC1276E7FB7EB82624F1485AEE5819B2C0DA3A5841C380
              Memory Dump Source
              • Source File: 00000000.00000002.4102697463.00000000016C0000.00000040.00000020.00020000.00000000.sdmp, Offset: 016C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_16c0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: c438a27276e0968fcdc2a499c6d87a0b64f2769294ce5e65665db8adb6b8d55a
              • Instruction ID: 9cb0a5fd288b2a5b297e257649440bdf3db2e735446886c6ef3e32aa1f6228d5
              • Opcode Fuzzy Hash: c438a27276e0968fcdc2a499c6d87a0b64f2769294ce5e65665db8adb6b8d55a
              • Instruction Fuzzy Hash: 7EF01D35104644DFC706CF04D980B26FBA2FB89718F24CAADE94917B52C737D813DA81
              Memory Dump Source
              • Source File: 00000000.00000002.4102697463.00000000016C0000.00000040.00000020.00020000.00000000.sdmp, Offset: 016C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_16c0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 45a39849244bf198312d654fc5493964e7558e26118d9243559601417d338319
              • Instruction ID: b5d4fd0a794f93df0733336accb6edf403825ac544a619dbc19d75149bf19ab7
              • Opcode Fuzzy Hash: 45a39849244bf198312d654fc5493964e7558e26118d9243559601417d338319
              • Instruction Fuzzy Hash: 09E092B66046004B9650CF0AFD41456F7E8EB88630708C57FDC0D8BB01D235B508CAA5
              Memory Dump Source
              • Source File: 00000000.00000002.4110433573.0000000005DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5da0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 3e53927ae0963a0fc62675fcfcd6d8d6be4145525fa9a2ffdc997b83ed998d3d
              • Instruction ID: 268b192cd3a0722387389d114a54d48328afaf895eda8d864ca4ea7bd5959212
              • Opcode Fuzzy Hash: 3e53927ae0963a0fc62675fcfcd6d8d6be4145525fa9a2ffdc997b83ed998d3d
              • Instruction Fuzzy Hash: EAE0D8B264030067D3208E06AC46F52FBD8DB54A31F14C667ED081B741D176B51489F1
              Memory Dump Source
              • Source File: 00000000.00000002.4110433573.0000000005DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5da0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 25847dab6832a2513640d55dabb7cd9a0629e482f30762244c8fc1003410e7bc
              • Instruction ID: be423d8be6728be2dc5fbbe7552aa430e2c002e884728b4ed96aa1952178046e
              • Opcode Fuzzy Hash: 25847dab6832a2513640d55dabb7cd9a0629e482f30762244c8fc1003410e7bc
              • Instruction Fuzzy Hash: AAE0D8B2A0020067D2209E06AC49F53FBD8DB44A31F14CA67ED091B701D176B614C9E1
              Memory Dump Source
              • Source File: 00000000.00000002.4110433573.0000000005DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5da0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 5eca34b1d7001a1ed8698cc2a5cf2613c542baab18dccf21e7e2c86810d0a674
              • Instruction ID: 92ec531a394af4f907d53115881da6bd0fe648b49666b02ba810e1528030c134
              • Opcode Fuzzy Hash: 5eca34b1d7001a1ed8698cc2a5cf2613c542baab18dccf21e7e2c86810d0a674
              • Instruction Fuzzy Hash: B2E0D8B260030467D2609E06AC45F53FBD8DB44A31F18C667ED091B702D276B51489F1
              Memory Dump Source
              • Source File: 00000000.00000002.4102778536.00000000016EA000.00000040.00000800.00020000.00000000.sdmp, Offset: 016EA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_16ea000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 8007a24400a502f0115b96de0f48d0bcb5e0c0f872b5cb3732d2c151bc30f64f
              • Instruction ID: 0888fa79797dfdf9370b53dad757cf35f25aa1162c51ec235400527869f5b757
              • Opcode Fuzzy Hash: 8007a24400a502f0115b96de0f48d0bcb5e0c0f872b5cb3732d2c151bc30f64f
              • Instruction Fuzzy Hash: C2E0D8B264020467D2208E06AC45F62F798DB54A31F14C667ED095B701D276B51489F1
              Memory Dump Source
              • Source File: 00000000.00000002.4109979889.0000000005590000.00000040.00000800.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5590000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 86936bad9c9c1c3e6b4a781f3c75f0c3a5d4ac6aa8eb08c69a13139f15cfd05e
              • Instruction ID: 621a1921bebbf7d61c555c92173a70e07df1fc2f51b2f2efba743008659559ed
              • Opcode Fuzzy Hash: 86936bad9c9c1c3e6b4a781f3c75f0c3a5d4ac6aa8eb08c69a13139f15cfd05e
              • Instruction Fuzzy Hash: ADE0D63090A348EFCB41CFB4DA024EC3BF0AB02210B0041BAD809D3622EA361E09DB42
              Memory Dump Source
              • Source File: 00000000.00000002.4109979889.0000000005590000.00000040.00000800.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5590000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 95ead9df320c4afe0c722054b2ff6eb24cc04645c360b9e47a71082f21d65f8a
              • Instruction ID: cbf0b1426869f4cd6c701305850f6dc2512c67c676f34120b4eea3edd222e6f0
              • Opcode Fuzzy Hash: 95ead9df320c4afe0c722054b2ff6eb24cc04645c360b9e47a71082f21d65f8a
              • Instruction Fuzzy Hash: C9E0C230242340CFCB1A5B7090290183BB1BF8321930004BFC446CB761EF3E8887CB00
              Memory Dump Source
              • Source File: 00000000.00000002.4109979889.0000000005590000.00000040.00000800.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5590000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 6736d9546132485c954c8255630479a8fdd71a5c71372263823ac2016a077537
              • Instruction ID: c6fbde2433c69d89f18049bb0b02384cd268eb632f5aea4716ea64ccc773f810
              • Opcode Fuzzy Hash: 6736d9546132485c954c8255630479a8fdd71a5c71372263823ac2016a077537
              • Instruction Fuzzy Hash: D3E01270A4938D9FCB56CFF0EA150EC7FF4AA9221071041EFC84697262D9290F29DB41
              Memory Dump Source
              • Source File: 00000000.00000002.4102713737.00000000016D2000.00000040.00000800.00020000.00000000.sdmp, Offset: 016D2000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_16d2000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 888a3ac0e88bf2ac7200167109c70f3149ca2f85ffddfbc7d784f3af0319fa2b
              • Instruction ID: 49123d148bfac28638343b2ec57f245f1c4b21c76cde38832fc78e0c813b1613
              • Opcode Fuzzy Hash: 888a3ac0e88bf2ac7200167109c70f3149ca2f85ffddfbc7d784f3af0319fa2b
              • Instruction Fuzzy Hash: 23D05E796066D14FE3279A1CCAA4F953BE4AB51718F4A44FDAC00CB763C768D5D1D600
              Memory Dump Source
              • Source File: 00000000.00000002.4102713737.00000000016D2000.00000040.00000800.00020000.00000000.sdmp, Offset: 016D2000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_16d2000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 85d678d555248ed430ceaac47fb426ac315a9c2130a28be89b636f155de459cd
              • Instruction ID: 769c79c53e578efd8e1b4177a178a94c52ae36c6e398cdd9f6601b21d41c88ef
              • Opcode Fuzzy Hash: 85d678d555248ed430ceaac47fb426ac315a9c2130a28be89b636f155de459cd
              • Instruction Fuzzy Hash: E8D05E346002814FD725DA0CC6E4F593BD4AF80714F0644ECAC108B762CBA4D8D0DA00
              Memory Dump Source
              • Source File: 00000000.00000002.4109979889.0000000005590000.00000040.00000800.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5590000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: c34bd0fe86ba463d6104ca801e36c1aff3fd32376574b972546d6c3e5f59a012
              • Instruction ID: 3c1ee30fd3975ba471ff38a7a70fcde1ee328af38fc0b4f4832a1374b546f9d6
              • Opcode Fuzzy Hash: c34bd0fe86ba463d6104ca801e36c1aff3fd32376574b972546d6c3e5f59a012
              • Instruction Fuzzy Hash: 95D0A930E01208EF8B00DFA8DD0089DB7F8EB05204B0001AAA809D3700EE321E04DB81