Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Gv10VZCeN7.exe

Overview

General Information

Sample name:Gv10VZCeN7.exe
renamed because original name is a hash value
Original sample name:1ed0c2e213e674c8a95694c9e19361c7.exe
Analysis ID:1589384
MD5:1ed0c2e213e674c8a95694c9e19361c7
SHA1:05446e3404b3171264fc344bf4013eb8ea2cf740
SHA256:6dfe16f82116f1537efcac4f015247d28339062bcbaa7fc75c9486caa76a9d0d
Tags:exenjratRATuser-abuse_ch
Infos:

Detection

Njrat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Njrat
AI detected suspicious sample
Creates autorun.inf (USB autostart)
Disables the Windows task manager (taskmgr)
Disables zone checking for all users
Drops PE files to the document folder of the user
Drops PE files to the startup folder
Drops PE files to the user root directory
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies the windows firewall
Uses netsh to modify the Windows network and firewall settings
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates a window with clipboard capturing capabilities
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the program root directory (C:\Program Files)
Drops PE files to the user directory
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May infect USB drives
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Startup Folder File Write
Stores files to the Windows start menu directory
Uses 32bit PE files
Yara signature match

Classification

  • System is w10x64
  • Gv10VZCeN7.exe (PID: 4208 cmdline: "C:\Users\user\Desktop\Gv10VZCeN7.exe" MD5: 1ED0C2E213E674C8A95694C9E19361C7)
    • server.exe (PID: 5252 cmdline: "C:\Users\user\server.exe" MD5: 1ED0C2E213E674C8A95694C9E19361C7)
      • netsh.exe (PID: 3176 cmdline: netsh firewall add allowedprogram "C:\Users\user\server.exe" "server.exe" ENABLE MD5: 4E89A1A088BE715D6C946E55AB07C7DF)
        • conhost.exe (PID: 2828 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • netsh.exe (PID: 6432 cmdline: netsh firewall delete allowedprogram "C:\Users\user\server.exe" MD5: 4E89A1A088BE715D6C946E55AB07C7DF)
        • conhost.exe (PID: 5440 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • netsh.exe (PID: 5520 cmdline: netsh firewall add allowedprogram "C:\Users\user\server.exe" "server.exe" ENABLE MD5: 4E89A1A088BE715D6C946E55AB07C7DF)
        • conhost.exe (PID: 2128 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • Discord.exe (PID: 1196 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exe" MD5: 1ED0C2E213E674C8A95694C9E19361C7)
  • Explower.exe (PID: 2220 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe" MD5: 1ED0C2E213E674C8A95694C9E19361C7)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
NjRATRedPacket Security describes NJRat as "a remote access trojan (RAT) has capabilities to log keystrokes, access the victim's camera, steal credentials stored in browsers, open a reverse shell, upload/download files, view the victim's desktop, perform process, file, and registry manipulations, and capabilities to let the attacker update, uninstall, restart, close, disconnect the RAT and rename its campaign ID. Through the Command & Control (CnC) server software, the attacker has capabilities to create and configure the malware to spread through USB drives."It is supposedly popular with actors in the Middle East. Similar to other RATs, many leaked builders may be backdoored.
  • AQUATIC PANDA
  • Earth Lusca
  • Operation C-Major
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.njrat
{"Campaign ID": "debil", "Version": "0.7d", "Install Name": "364d88128926b2e822553333b20c197f", "Install Dir": "system", "Registry Value": "Software\\Microsoft\\Windows\\CurrentVersion\\Run", "Network Seprator": "|'|'|"}
SourceRuleDescriptionAuthorStrings
Gv10VZCeN7.exeJoeSecurity_NjratYara detected NjratJoe Security
    Gv10VZCeN7.exeWindows_Trojan_Njrat_30f3c220unknownunknown
    • 0x115d2:$a1: get_Registry
    • 0x15a39:$a2: SEE_MASK_NOZONECHECKS
    • 0x156db:$a3: Download ERROR
    • 0x15c8b:$a4: cmd.exe /c ping 0 -n 2 & del "
    • 0x13c18:$a5: netsh firewall delete allowedprogram "
    Gv10VZCeN7.exeCN_disclosed_20180208_cDetects malware from disclosed CN malware setFlorian Roth
    • 0x15c8b:$x1: cmd.exe /c ping 0 -n 2 & del "
    • 0x137a4:$s1: winmgmts:\\.\root\SecurityCenter2
    • 0x156f9:$s3: Executed As
    • 0x124f0:$s5: Stub.exe
    • 0x156db:$s6: Download ERROR
    • 0x13766:$s8: Select * From AntiVirusProduct
    Gv10VZCeN7.execrimeware_njrat_stringsDetects njRAT based on some stringsSekoia.io
    • 0x1547d:$: set cdaudio door closed
    • 0x15441:$: set cdaudio door open
    • 0x15ca1:$: ping 0
    • 0x13412:$: [endof]
    • 0x132cc:$: TiGeR-Firewall
    • 0x132fa:$: NetSnifferCs
    • 0x132b8:$: IPBlocker
    • 0x13314:$: Sandboxie Control
    Gv10VZCeN7.exeNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
    • 0x15a39:$reg: SEE_MASK_NOZONECHECKS
    • 0x156bf:$msg: Execute ERROR
    • 0x15713:$msg: Execute ERROR
    • 0x15c8b:$ping: cmd.exe /c ping 0 -n 2 & del
    Click to see the 1 entries
    SourceRuleDescriptionAuthorStrings
    C:\Program Files (x86)\Explower.exeJoeSecurity_NjratYara detected NjratJoe Security
      C:\Program Files (x86)\Explower.exeWindows_Trojan_Njrat_30f3c220unknownunknown
      • 0x115d2:$a1: get_Registry
      • 0x15a39:$a2: SEE_MASK_NOZONECHECKS
      • 0x156db:$a3: Download ERROR
      • 0x15c8b:$a4: cmd.exe /c ping 0 -n 2 & del "
      • 0x13c18:$a5: netsh firewall delete allowedprogram "
      C:\Program Files (x86)\Explower.exeCN_disclosed_20180208_cDetects malware from disclosed CN malware setFlorian Roth
      • 0x15c8b:$x1: cmd.exe /c ping 0 -n 2 & del "
      • 0x137a4:$s1: winmgmts:\\.\root\SecurityCenter2
      • 0x156f9:$s3: Executed As
      • 0x124f0:$s5: Stub.exe
      • 0x156db:$s6: Download ERROR
      • 0x13766:$s8: Select * From AntiVirusProduct
      C:\Program Files (x86)\Explower.execrimeware_njrat_stringsDetects njRAT based on some stringsSekoia.io
      • 0x1547d:$: set cdaudio door closed
      • 0x15441:$: set cdaudio door open
      • 0x15ca1:$: ping 0
      • 0x13412:$: [endof]
      • 0x132cc:$: TiGeR-Firewall
      • 0x132fa:$: NetSnifferCs
      • 0x132b8:$: IPBlocker
      • 0x13314:$: Sandboxie Control
      C:\Program Files (x86)\Explower.exeNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
      • 0x15a39:$reg: SEE_MASK_NOZONECHECKS
      • 0x156bf:$msg: Execute ERROR
      • 0x15713:$msg: Execute ERROR
      • 0x15c8b:$ping: cmd.exe /c ping 0 -n 2 & del
      Click to see the 85 entries
      SourceRuleDescriptionAuthorStrings
      00000000.00000002.2050391420.0000000003CD8000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_NjratYara detected NjratJoe Security
        00000000.00000002.2050391420.0000000003CD8000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Njrat_30f3c220unknownunknown
        • 0x115f2:$a1: get_Registry
        • 0x15a59:$a2: SEE_MASK_NOZONECHECKS
        • 0x156fb:$a3: Download ERROR
        • 0x15cab:$a4: cmd.exe /c ping 0 -n 2 & del "
        • 0x13c38:$a5: netsh firewall delete allowedprogram "
        00000000.00000002.2050391420.0000000003CD8000.00000004.00000800.00020000.00000000.sdmpNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
        • 0x15a59:$reg: SEE_MASK_NOZONECHECKS
        • 0x156df:$msg: Execute ERROR
        • 0x15733:$msg: Execute ERROR
        • 0x15cab:$ping: cmd.exe /c ping 0 -n 2 & del
        00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_NjratYara detected NjratJoe Security
          00000000.00000000.2026002461.0000000000622000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_NjratYara detected NjratJoe Security
            Click to see the 4 entries
            SourceRuleDescriptionAuthorStrings
            0.0.Gv10VZCeN7.exe.620000.0.unpackJoeSecurity_NjratYara detected NjratJoe Security
              0.0.Gv10VZCeN7.exe.620000.0.unpackWindows_Trojan_Njrat_30f3c220unknownunknown
              • 0x115d2:$a1: get_Registry
              • 0x15a39:$a2: SEE_MASK_NOZONECHECKS
              • 0x156db:$a3: Download ERROR
              • 0x15c8b:$a4: cmd.exe /c ping 0 -n 2 & del "
              • 0x13c18:$a5: netsh firewall delete allowedprogram "
              0.0.Gv10VZCeN7.exe.620000.0.unpackCN_disclosed_20180208_cDetects malware from disclosed CN malware setFlorian Roth
              • 0x15c8b:$x1: cmd.exe /c ping 0 -n 2 & del "
              • 0x137a4:$s1: winmgmts:\\.\root\SecurityCenter2
              • 0x156f9:$s3: Executed As
              • 0x124f0:$s5: Stub.exe
              • 0x156db:$s6: Download ERROR
              • 0x13766:$s8: Select * From AntiVirusProduct
              0.0.Gv10VZCeN7.exe.620000.0.unpackcrimeware_njrat_stringsDetects njRAT based on some stringsSekoia.io
              • 0x1547d:$: set cdaudio door closed
              • 0x15441:$: set cdaudio door open
              • 0x15ca1:$: ping 0
              • 0x13412:$: [endof]
              • 0x132cc:$: TiGeR-Firewall
              • 0x132fa:$: NetSnifferCs
              • 0x132b8:$: IPBlocker
              • 0x13314:$: Sandboxie Control
              0.0.Gv10VZCeN7.exe.620000.0.unpackNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
              • 0x15a39:$reg: SEE_MASK_NOZONECHECKS
              • 0x156bf:$msg: Execute ERROR
              • 0x15713:$msg: Execute ERROR
              • 0x15c8b:$ping: cmd.exe /c ping 0 -n 2 & del
              Click to see the 1 entries

              System Summary

              barindex
              Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Users\user\server.exe, ProcessId: 5252, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exe
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-12T04:22:10.317562+010020211761Malware Command and Control Activity Detected192.168.2.549704178.215.236.2274411TCP
              2025-01-12T04:22:12.511500+010020211761Malware Command and Control Activity Detected192.168.2.549705178.215.236.2274411TCP
              2025-01-12T04:22:15.072271+010020211761Malware Command and Control Activity Detected192.168.2.549706178.215.236.2274411TCP
              2025-01-12T04:22:17.754342+010020211761Malware Command and Control Activity Detected192.168.2.549707178.215.236.2274411TCP
              2025-01-12T04:22:20.231848+010020211761Malware Command and Control Activity Detected192.168.2.549709178.215.236.2274411TCP
              2025-01-12T04:22:22.826585+010020211761Malware Command and Control Activity Detected192.168.2.549718178.215.236.2274411TCP
              2025-01-12T04:22:25.506261+010020211761Malware Command and Control Activity Detected192.168.2.549735178.215.236.2274411TCP
              2025-01-12T04:22:28.059981+010020211761Malware Command and Control Activity Detected192.168.2.549748178.215.236.2274411TCP
              2025-01-12T04:22:30.603246+010020211761Malware Command and Control Activity Detected192.168.2.549762178.215.236.2274411TCP
              2025-01-12T04:22:33.234000+010020211761Malware Command and Control Activity Detected192.168.2.549777178.215.236.2274411TCP
              2025-01-12T04:22:36.251465+010020211761Malware Command and Control Activity Detected192.168.2.549788178.215.236.2274411TCP
              2025-01-12T04:22:38.738651+010020211761Malware Command and Control Activity Detected192.168.2.549803178.215.236.2274411TCP
              2025-01-12T04:22:41.166350+010020211761Malware Command and Control Activity Detected192.168.2.549819178.215.236.2274411TCP
              2025-01-12T04:22:44.124554+010020211761Malware Command and Control Activity Detected192.168.2.549833178.215.236.2274411TCP
              2025-01-12T04:22:46.687172+010020211761Malware Command and Control Activity Detected192.168.2.549849178.215.236.2274411TCP
              2025-01-12T04:22:49.359495+010020211761Malware Command and Control Activity Detected192.168.2.549865178.215.236.2274411TCP
              2025-01-12T04:22:51.988044+010020211761Malware Command and Control Activity Detected192.168.2.549881178.215.236.2274411TCP
              2025-01-12T04:22:54.490093+010020211761Malware Command and Control Activity Detected192.168.2.549897178.215.236.2274411TCP
              2025-01-12T04:22:57.104085+010020211761Malware Command and Control Activity Detected192.168.2.549910178.215.236.2274411TCP
              2025-01-12T04:22:59.603584+010020211761Malware Command and Control Activity Detected192.168.2.549928178.215.236.2274411TCP
              2025-01-12T04:23:02.417591+010020211761Malware Command and Control Activity Detected192.168.2.549943178.215.236.2274411TCP
              2025-01-12T04:23:04.962457+010020211761Malware Command and Control Activity Detected192.168.2.549962178.215.236.2274411TCP
              2025-01-12T04:23:07.510300+010020211761Malware Command and Control Activity Detected192.168.2.549978178.215.236.2274411TCP
              2025-01-12T04:23:10.072428+010020211761Malware Command and Control Activity Detected192.168.2.549991178.215.236.2274411TCP
              2025-01-12T04:23:12.635465+010020211761Malware Command and Control Activity Detected192.168.2.549998178.215.236.2274411TCP
              2025-01-12T04:23:15.205821+010020211761Malware Command and Control Activity Detected192.168.2.549999178.215.236.2274411TCP
              2025-01-12T04:23:18.154861+010020211761Malware Command and Control Activity Detected192.168.2.550000178.215.236.2274411TCP
              2025-01-12T04:23:20.340859+010020211761Malware Command and Control Activity Detected192.168.2.550001178.215.236.2274411TCP
              2025-01-12T04:23:22.919125+010020211761Malware Command and Control Activity Detected192.168.2.550002178.215.236.2274411TCP
              2025-01-12T04:23:25.484397+010020211761Malware Command and Control Activity Detected192.168.2.550003178.215.236.2274411TCP
              2025-01-12T04:23:28.041838+010020211761Malware Command and Control Activity Detected192.168.2.550004178.215.236.2274411TCP
              2025-01-12T04:23:31.278781+010020211761Malware Command and Control Activity Detected192.168.2.550005178.215.236.2274411TCP
              2025-01-12T04:23:33.978208+010020211761Malware Command and Control Activity Detected192.168.2.550006178.215.236.2274411TCP
              2025-01-12T04:23:36.543124+010020211761Malware Command and Control Activity Detected192.168.2.550007178.215.236.2274411TCP
              2025-01-12T04:23:39.101567+010020211761Malware Command and Control Activity Detected192.168.2.550008178.215.236.2274411TCP
              2025-01-12T04:23:41.689312+010020211761Malware Command and Control Activity Detected192.168.2.550009178.215.236.2274411TCP
              2025-01-12T04:23:44.251176+010020211761Malware Command and Control Activity Detected192.168.2.550010178.215.236.2274411TCP
              2025-01-12T04:23:46.812129+010020211761Malware Command and Control Activity Detected192.168.2.550011178.215.236.2274411TCP
              2025-01-12T04:23:53.779714+010020211761Malware Command and Control Activity Detected192.168.2.550012178.215.236.2274411TCP
              2025-01-12T04:23:57.470603+010020211761Malware Command and Control Activity Detected192.168.2.550013178.215.236.2274411TCP
              2025-01-12T04:23:59.969035+010020211761Malware Command and Control Activity Detected192.168.2.550014178.215.236.2274411TCP
              2025-01-12T04:24:04.229677+010020211761Malware Command and Control Activity Detected192.168.2.550015178.215.236.2274411TCP
              2025-01-12T04:24:07.185304+010020211761Malware Command and Control Activity Detected192.168.2.550016178.215.236.2274411TCP
              2025-01-12T04:24:09.747641+010020211761Malware Command and Control Activity Detected192.168.2.550017178.215.236.2274411TCP
              2025-01-12T04:24:12.332065+010020211761Malware Command and Control Activity Detected192.168.2.550018178.215.236.2274411TCP
              2025-01-12T04:24:14.897831+010020211761Malware Command and Control Activity Detected192.168.2.550019178.215.236.2274411TCP
              2025-01-12T04:24:17.453736+010020211761Malware Command and Control Activity Detected192.168.2.550020178.215.236.2274411TCP
              2025-01-12T04:24:33.213631+010020211761Malware Command and Control Activity Detected192.168.2.550021178.215.236.2274411TCP
              2025-01-12T04:24:36.525406+010020211761Malware Command and Control Activity Detected192.168.2.550022178.215.236.2274411TCP
              2025-01-12T04:24:39.348273+010020211761Malware Command and Control Activity Detected192.168.2.550023178.215.236.2274411TCP
              2025-01-12T04:24:42.096740+010020211761Malware Command and Control Activity Detected192.168.2.550024178.215.236.2274411TCP
              2025-01-12T04:24:44.649120+010020211761Malware Command and Control Activity Detected192.168.2.550025178.215.236.2274411TCP
              2025-01-12T04:24:49.227274+010020211761Malware Command and Control Activity Detected192.168.2.550026178.215.236.2274411TCP
              2025-01-12T04:24:51.818623+010020211761Malware Command and Control Activity Detected192.168.2.550027178.215.236.2274411TCP
              2025-01-12T04:24:54.526103+010020211761Malware Command and Control Activity Detected192.168.2.550028178.215.236.2274411TCP
              2025-01-12T04:24:57.084418+010020211761Malware Command and Control Activity Detected192.168.2.550029178.215.236.2274411TCP
              2025-01-12T04:24:59.727935+010020211761Malware Command and Control Activity Detected192.168.2.550030178.215.236.2274411TCP
              2025-01-12T04:25:02.294495+010020211761Malware Command and Control Activity Detected192.168.2.550031178.215.236.2274411TCP
              2025-01-12T04:25:04.838352+010020211761Malware Command and Control Activity Detected192.168.2.550032178.215.236.2274411TCP
              2025-01-12T04:25:07.566773+010020211761Malware Command and Control Activity Detected192.168.2.550033178.215.236.2274411TCP
              2025-01-12T04:25:10.058312+010020211761Malware Command and Control Activity Detected192.168.2.550034178.215.236.2274411TCP
              2025-01-12T04:25:12.650832+010020211761Malware Command and Control Activity Detected192.168.2.550035178.215.236.2274411TCP
              2025-01-12T04:25:17.174700+010020211761Malware Command and Control Activity Detected192.168.2.550036178.215.236.2274411TCP
              2025-01-12T04:25:21.035332+010020211761Malware Command and Control Activity Detected192.168.2.550037178.215.236.2274411TCP
              2025-01-12T04:25:23.089087+010020211761Malware Command and Control Activity Detected192.168.2.550038178.215.236.2274411TCP
              2025-01-12T04:25:25.667622+010020211761Malware Command and Control Activity Detected192.168.2.550039178.215.236.2274411TCP
              2025-01-12T04:25:28.200676+010020211761Malware Command and Control Activity Detected192.168.2.550040178.215.236.2274411TCP
              2025-01-12T04:25:30.746919+010020211761Malware Command and Control Activity Detected192.168.2.550041178.215.236.2274411TCP
              2025-01-12T04:25:33.299500+010020211761Malware Command and Control Activity Detected192.168.2.550042178.215.236.2274411TCP
              2025-01-12T04:25:35.854273+010020211761Malware Command and Control Activity Detected192.168.2.550043178.215.236.2274411TCP
              2025-01-12T04:25:38.549790+010020211761Malware Command and Control Activity Detected192.168.2.550044178.215.236.2274411TCP
              2025-01-12T04:25:41.103550+010020211761Malware Command and Control Activity Detected192.168.2.550045178.215.236.2274411TCP
              2025-01-12T04:25:44.495051+010020211761Malware Command and Control Activity Detected192.168.2.550046178.215.236.2274411TCP
              2025-01-12T04:25:46.839517+010020211761Malware Command and Control Activity Detected192.168.2.550047178.215.236.2274411TCP
              2025-01-12T04:25:49.475532+010020211761Malware Command and Control Activity Detected192.168.2.550048178.215.236.2274411TCP
              2025-01-12T04:25:52.010916+010020211761Malware Command and Control Activity Detected192.168.2.550049178.215.236.2274411TCP
              2025-01-12T04:25:54.560745+010020211761Malware Command and Control Activity Detected192.168.2.550050178.215.236.2274411TCP
              2025-01-12T04:25:57.426206+010020211761Malware Command and Control Activity Detected192.168.2.550051178.215.236.2274411TCP
              2025-01-12T04:26:03.371823+010020211761Malware Command and Control Activity Detected192.168.2.550052178.215.236.2274411TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-12T04:22:10.317562+010020331321Malware Command and Control Activity Detected192.168.2.549704178.215.236.2274411TCP
              2025-01-12T04:22:12.511500+010020331321Malware Command and Control Activity Detected192.168.2.549705178.215.236.2274411TCP
              2025-01-12T04:22:15.072271+010020331321Malware Command and Control Activity Detected192.168.2.549706178.215.236.2274411TCP
              2025-01-12T04:22:17.754342+010020331321Malware Command and Control Activity Detected192.168.2.549707178.215.236.2274411TCP
              2025-01-12T04:22:20.231848+010020331321Malware Command and Control Activity Detected192.168.2.549709178.215.236.2274411TCP
              2025-01-12T04:22:22.826585+010020331321Malware Command and Control Activity Detected192.168.2.549718178.215.236.2274411TCP
              2025-01-12T04:22:25.506261+010020331321Malware Command and Control Activity Detected192.168.2.549735178.215.236.2274411TCP
              2025-01-12T04:22:28.059981+010020331321Malware Command and Control Activity Detected192.168.2.549748178.215.236.2274411TCP
              2025-01-12T04:22:30.603246+010020331321Malware Command and Control Activity Detected192.168.2.549762178.215.236.2274411TCP
              2025-01-12T04:22:33.234000+010020331321Malware Command and Control Activity Detected192.168.2.549777178.215.236.2274411TCP
              2025-01-12T04:22:36.251465+010020331321Malware Command and Control Activity Detected192.168.2.549788178.215.236.2274411TCP
              2025-01-12T04:22:38.738651+010020331321Malware Command and Control Activity Detected192.168.2.549803178.215.236.2274411TCP
              2025-01-12T04:22:41.166350+010020331321Malware Command and Control Activity Detected192.168.2.549819178.215.236.2274411TCP
              2025-01-12T04:22:44.124554+010020331321Malware Command and Control Activity Detected192.168.2.549833178.215.236.2274411TCP
              2025-01-12T04:22:46.687172+010020331321Malware Command and Control Activity Detected192.168.2.549849178.215.236.2274411TCP
              2025-01-12T04:22:49.359495+010020331321Malware Command and Control Activity Detected192.168.2.549865178.215.236.2274411TCP
              2025-01-12T04:22:51.988044+010020331321Malware Command and Control Activity Detected192.168.2.549881178.215.236.2274411TCP
              2025-01-12T04:22:54.490093+010020331321Malware Command and Control Activity Detected192.168.2.549897178.215.236.2274411TCP
              2025-01-12T04:22:57.104085+010020331321Malware Command and Control Activity Detected192.168.2.549910178.215.236.2274411TCP
              2025-01-12T04:22:59.603584+010020331321Malware Command and Control Activity Detected192.168.2.549928178.215.236.2274411TCP
              2025-01-12T04:23:02.417591+010020331321Malware Command and Control Activity Detected192.168.2.549943178.215.236.2274411TCP
              2025-01-12T04:23:04.962457+010020331321Malware Command and Control Activity Detected192.168.2.549962178.215.236.2274411TCP
              2025-01-12T04:23:07.510300+010020331321Malware Command and Control Activity Detected192.168.2.549978178.215.236.2274411TCP
              2025-01-12T04:23:10.072428+010020331321Malware Command and Control Activity Detected192.168.2.549991178.215.236.2274411TCP
              2025-01-12T04:23:12.635465+010020331321Malware Command and Control Activity Detected192.168.2.549998178.215.236.2274411TCP
              2025-01-12T04:23:15.205821+010020331321Malware Command and Control Activity Detected192.168.2.549999178.215.236.2274411TCP
              2025-01-12T04:23:18.154861+010020331321Malware Command and Control Activity Detected192.168.2.550000178.215.236.2274411TCP
              2025-01-12T04:23:20.340859+010020331321Malware Command and Control Activity Detected192.168.2.550001178.215.236.2274411TCP
              2025-01-12T04:23:22.919125+010020331321Malware Command and Control Activity Detected192.168.2.550002178.215.236.2274411TCP
              2025-01-12T04:23:25.484397+010020331321Malware Command and Control Activity Detected192.168.2.550003178.215.236.2274411TCP
              2025-01-12T04:23:28.041838+010020331321Malware Command and Control Activity Detected192.168.2.550004178.215.236.2274411TCP
              2025-01-12T04:23:31.278781+010020331321Malware Command and Control Activity Detected192.168.2.550005178.215.236.2274411TCP
              2025-01-12T04:23:33.978208+010020331321Malware Command and Control Activity Detected192.168.2.550006178.215.236.2274411TCP
              2025-01-12T04:23:36.543124+010020331321Malware Command and Control Activity Detected192.168.2.550007178.215.236.2274411TCP
              2025-01-12T04:23:39.101567+010020331321Malware Command and Control Activity Detected192.168.2.550008178.215.236.2274411TCP
              2025-01-12T04:23:41.689312+010020331321Malware Command and Control Activity Detected192.168.2.550009178.215.236.2274411TCP
              2025-01-12T04:23:44.251176+010020331321Malware Command and Control Activity Detected192.168.2.550010178.215.236.2274411TCP
              2025-01-12T04:23:46.812129+010020331321Malware Command and Control Activity Detected192.168.2.550011178.215.236.2274411TCP
              2025-01-12T04:23:53.779714+010020331321Malware Command and Control Activity Detected192.168.2.550012178.215.236.2274411TCP
              2025-01-12T04:23:57.470603+010020331321Malware Command and Control Activity Detected192.168.2.550013178.215.236.2274411TCP
              2025-01-12T04:23:59.969035+010020331321Malware Command and Control Activity Detected192.168.2.550014178.215.236.2274411TCP
              2025-01-12T04:24:04.229677+010020331321Malware Command and Control Activity Detected192.168.2.550015178.215.236.2274411TCP
              2025-01-12T04:24:07.185304+010020331321Malware Command and Control Activity Detected192.168.2.550016178.215.236.2274411TCP
              2025-01-12T04:24:09.747641+010020331321Malware Command and Control Activity Detected192.168.2.550017178.215.236.2274411TCP
              2025-01-12T04:24:12.332065+010020331321Malware Command and Control Activity Detected192.168.2.550018178.215.236.2274411TCP
              2025-01-12T04:24:14.897831+010020331321Malware Command and Control Activity Detected192.168.2.550019178.215.236.2274411TCP
              2025-01-12T04:24:17.453736+010020331321Malware Command and Control Activity Detected192.168.2.550020178.215.236.2274411TCP
              2025-01-12T04:24:33.213631+010020331321Malware Command and Control Activity Detected192.168.2.550021178.215.236.2274411TCP
              2025-01-12T04:24:36.525406+010020331321Malware Command and Control Activity Detected192.168.2.550022178.215.236.2274411TCP
              2025-01-12T04:24:39.348273+010020331321Malware Command and Control Activity Detected192.168.2.550023178.215.236.2274411TCP
              2025-01-12T04:24:42.096740+010020331321Malware Command and Control Activity Detected192.168.2.550024178.215.236.2274411TCP
              2025-01-12T04:24:44.649120+010020331321Malware Command and Control Activity Detected192.168.2.550025178.215.236.2274411TCP
              2025-01-12T04:24:49.227274+010020331321Malware Command and Control Activity Detected192.168.2.550026178.215.236.2274411TCP
              2025-01-12T04:24:51.818623+010020331321Malware Command and Control Activity Detected192.168.2.550027178.215.236.2274411TCP
              2025-01-12T04:24:54.526103+010020331321Malware Command and Control Activity Detected192.168.2.550028178.215.236.2274411TCP
              2025-01-12T04:24:57.084418+010020331321Malware Command and Control Activity Detected192.168.2.550029178.215.236.2274411TCP
              2025-01-12T04:24:59.727935+010020331321Malware Command and Control Activity Detected192.168.2.550030178.215.236.2274411TCP
              2025-01-12T04:25:02.294495+010020331321Malware Command and Control Activity Detected192.168.2.550031178.215.236.2274411TCP
              2025-01-12T04:25:04.838352+010020331321Malware Command and Control Activity Detected192.168.2.550032178.215.236.2274411TCP
              2025-01-12T04:25:07.566773+010020331321Malware Command and Control Activity Detected192.168.2.550033178.215.236.2274411TCP
              2025-01-12T04:25:10.058312+010020331321Malware Command and Control Activity Detected192.168.2.550034178.215.236.2274411TCP
              2025-01-12T04:25:12.650832+010020331321Malware Command and Control Activity Detected192.168.2.550035178.215.236.2274411TCP
              2025-01-12T04:25:17.174700+010020331321Malware Command and Control Activity Detected192.168.2.550036178.215.236.2274411TCP
              2025-01-12T04:25:21.035332+010020331321Malware Command and Control Activity Detected192.168.2.550037178.215.236.2274411TCP
              2025-01-12T04:25:23.089087+010020331321Malware Command and Control Activity Detected192.168.2.550038178.215.236.2274411TCP
              2025-01-12T04:25:25.667622+010020331321Malware Command and Control Activity Detected192.168.2.550039178.215.236.2274411TCP
              2025-01-12T04:25:28.200676+010020331321Malware Command and Control Activity Detected192.168.2.550040178.215.236.2274411TCP
              2025-01-12T04:25:30.746919+010020331321Malware Command and Control Activity Detected192.168.2.550041178.215.236.2274411TCP
              2025-01-12T04:25:33.299500+010020331321Malware Command and Control Activity Detected192.168.2.550042178.215.236.2274411TCP
              2025-01-12T04:25:35.854273+010020331321Malware Command and Control Activity Detected192.168.2.550043178.215.236.2274411TCP
              2025-01-12T04:25:38.549790+010020331321Malware Command and Control Activity Detected192.168.2.550044178.215.236.2274411TCP
              2025-01-12T04:25:41.103550+010020331321Malware Command and Control Activity Detected192.168.2.550045178.215.236.2274411TCP
              2025-01-12T04:25:44.495051+010020331321Malware Command and Control Activity Detected192.168.2.550046178.215.236.2274411TCP
              2025-01-12T04:25:46.839517+010020331321Malware Command and Control Activity Detected192.168.2.550047178.215.236.2274411TCP
              2025-01-12T04:25:49.475532+010020331321Malware Command and Control Activity Detected192.168.2.550048178.215.236.2274411TCP
              2025-01-12T04:25:52.010916+010020331321Malware Command and Control Activity Detected192.168.2.550049178.215.236.2274411TCP
              2025-01-12T04:25:54.560745+010020331321Malware Command and Control Activity Detected192.168.2.550050178.215.236.2274411TCP
              2025-01-12T04:25:57.426206+010020331321Malware Command and Control Activity Detected192.168.2.550051178.215.236.2274411TCP
              2025-01-12T04:26:03.371823+010020331321Malware Command and Control Activity Detected192.168.2.550052178.215.236.2274411TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-12T04:22:44.336896+010028255641Malware Command and Control Activity Detected192.168.2.549833178.215.236.2274411TCP
              2025-01-12T04:23:02.554734+010028255641Malware Command and Control Activity Detected192.168.2.549943178.215.236.2274411TCP
              2025-01-12T04:24:36.625895+010028255641Malware Command and Control Activity Detected192.168.2.550022178.215.236.2274411TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: Gv10VZCeN7.exeAvira: detected
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exeAvira: detection malicious, Label: TR/Dropper.Gen
              Source: C:\Notepad.exeAvira: detection malicious, Label: TR/Dropper.Gen
              Source: C:\Program Files (x86)\Explower.exeAvira: detection malicious, Label: TR/Dropper.Gen
              Source: C:\Program Files (x86)\Explower.exeAvira: detection malicious, Label: TR/Dropper.Gen
              Source: C:\Program Files (x86)\Explower.exeAvira: detection malicious, Label: TR/Dropper.Gen
              Source: C:\Program Files (x86)\Explower.exeAvira: detection malicious, Label: TR/Dropper.Gen
              Source: C:\Program Files (x86)\Explower.exeAvira: detection malicious, Label: TR/Dropper.Gen
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeAvira: detection malicious, Label: TR/Dropper.Gen
              Source: C:\Program Files (x86)\Explower.exeAvira: detection malicious, Label: TR/Dropper.Gen
              Source: C:\Umbrella.flv.exeAvira: detection malicious, Label: TR/Dropper.Gen
              Source: C:\Users\user\server.exeAvira: detection malicious, Label: TR/Dropper.Gen
              Source: C:\Program Files (x86)\Explower.exeAvira: detection malicious, Label: TR/Dropper.Gen
              Source: C:\Program Files (x86)\Explower.exeAvira: detection malicious, Label: TR/Dropper.Gen
              Source: C:\Program Files (x86)\Explower.exeAvira: detection malicious, Label: TR/Dropper.Gen
              Source: C:\Program Files (x86)\Explower.exeAvira: detection malicious, Label: TR/Dropper.Gen
              Source: 0.0.Gv10VZCeN7.exe.620000.0.unpackMalware Configuration Extractor: Njrat {"Campaign ID": "debil", "Version": "0.7d", "Install Name": "364d88128926b2e822553333b20c197f", "Install Dir": "system", "Registry Value": "Software\\Microsoft\\Windows\\CurrentVersion\\Run", "Network Seprator": "|'|'|"}
              Source: C:\Notepad.exeReversingLabs: Detection: 95%
              Source: C:\Notepad.exeVirustotal: Detection: 70%Perma Link
              Source: C:\Program Files (x86)\Explower.exeReversingLabs: Detection: 95%
              Source: C:\Program Files (x86)\Explower.exeVirustotal: Detection: 70%Perma Link
              Source: C:\Umbrella.flv.exeReversingLabs: Detection: 95%
              Source: C:\Umbrella.flv.exeVirustotal: Detection: 70%Perma Link
              Source: C:\Users\user\AppData\Local\Explower.exeReversingLabs: Detection: 95%
              Source: C:\Users\user\AppData\Local\Explower.exeVirustotal: Detection: 70%Perma Link
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\History\Explower.exeReversingLabs: Detection: 95%
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Explower.exeReversingLabs: Detection: 95%
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\Explower.exeReversingLabs: Detection: 95%
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeReversingLabs: Detection: 95%
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exeReversingLabs: Detection: 95%
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeReversingLabs: Detection: 95%
              Source: C:\Users\user\Desktop\Explower.exeReversingLabs: Detection: 95%
              Source: C:\Users\user\Documents\Explower.exeReversingLabs: Detection: 95%
              Source: C:\Users\user\Favorites\Explower.exeReversingLabs: Detection: 95%
              Source: C:\Users\user\server.exeReversingLabs: Detection: 95%
              Source: C:\Windows\SysWOW64\Explower.exeReversingLabs: Detection: 95%
              Source: Gv10VZCeN7.exeVirustotal: Detection: 70%Perma Link
              Source: Gv10VZCeN7.exeReversingLabs: Detection: 95%
              Source: Yara matchFile source: Gv10VZCeN7.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.Gv10VZCeN7.exe.620000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.2050391420.0000000003CD8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000000.2026002461.0000000000622000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Gv10VZCeN7.exe PID: 4208, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: server.exe PID: 5252, type: MEMORYSTR
              Source: Yara matchFile source: C:\Program Files (x86)\Explower.exe, type: DROPPED
              Source: Yara matchFile source: C:\Notepad.exe, type: DROPPED
              Source: Yara matchFile source: C:\Umbrella.flv.exe, type: DROPPED
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exe, type: DROPPED
              Source: Yara matchFile source: C:\Users\user\server.exe, type: DROPPED
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exe, type: DROPPED
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exeJoe Sandbox ML: detected
              Source: C:\Notepad.exeJoe Sandbox ML: detected
              Source: C:\Program Files (x86)\Explower.exeJoe Sandbox ML: detected
              Source: C:\Program Files (x86)\Explower.exeJoe Sandbox ML: detected
              Source: C:\Program Files (x86)\Explower.exeJoe Sandbox ML: detected
              Source: C:\Program Files (x86)\Explower.exeJoe Sandbox ML: detected
              Source: C:\Program Files (x86)\Explower.exeJoe Sandbox ML: detected
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeJoe Sandbox ML: detected
              Source: C:\Program Files (x86)\Explower.exeJoe Sandbox ML: detected
              Source: C:\Umbrella.flv.exeJoe Sandbox ML: detected
              Source: C:\Users\user\server.exeJoe Sandbox ML: detected
              Source: C:\Program Files (x86)\Explower.exeJoe Sandbox ML: detected
              Source: C:\Program Files (x86)\Explower.exeJoe Sandbox ML: detected
              Source: C:\Program Files (x86)\Explower.exeJoe Sandbox ML: detected
              Source: C:\Program Files (x86)\Explower.exeJoe Sandbox ML: detected
              Source: Gv10VZCeN7.exeJoe Sandbox ML: detected
              Source: Gv10VZCeN7.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
              Source: Gv10VZCeN7.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

              Spreading

              barindex
              Source: C:\Users\user\server.exeFile created: C:\autorun.infJump to behavior
              Source: Gv10VZCeN7.exe, 00000000.00000002.2050391420.0000000003CD8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \autorun.inf
              Source: Gv10VZCeN7.exe, 00000000.00000002.2050391420.0000000003CD8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: [autorun]
              Source: Gv10VZCeN7.exe, 00000000.00000002.2050391420.0000000003CD8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: autorun.inf
              Source: Gv10VZCeN7.exe, 00000000.00000000.2026002461.0000000000622000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: \autorun.inf
              Source: Gv10VZCeN7.exe, 00000000.00000000.2026002461.0000000000622000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: [autorun]
              Source: Gv10VZCeN7.exe, 00000000.00000000.2026002461.0000000000622000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: autorun.inf
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \autorun.inf
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: [autorun]
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: autorun.inf$OPk
              Source: Gv10VZCeN7.exeBinary or memory string: \autorun.inf
              Source: Gv10VZCeN7.exeBinary or memory string: [autorun]
              Source: Gv10VZCeN7.exeBinary or memory string: autorun.inf
              Source: Discord.exe.2.drBinary or memory string: \autorun.inf
              Source: Discord.exe.2.drBinary or memory string: [autorun]
              Source: Discord.exe.2.drBinary or memory string: autorun.inf
              Source: autorun.inf.2.drBinary or memory string: [autorun]
              Source: Notepad.exe.2.drBinary or memory string: \autorun.inf
              Source: Notepad.exe.2.drBinary or memory string: [autorun]
              Source: Notepad.exe.2.drBinary or memory string: autorun.inf
              Source: Explower.exe7.2.drBinary or memory string: \autorun.inf
              Source: Explower.exe7.2.drBinary or memory string: [autorun]
              Source: Explower.exe7.2.drBinary or memory string: autorun.inf
              Source: Explower.exe2.2.drBinary or memory string: \autorun.inf
              Source: Explower.exe2.2.drBinary or memory string: [autorun]
              Source: Explower.exe2.2.drBinary or memory string: autorun.inf
              Source: Explower.exe5.2.drBinary or memory string: \autorun.inf
              Source: Explower.exe5.2.drBinary or memory string: [autorun]
              Source: Explower.exe5.2.drBinary or memory string: autorun.inf
              Source: Explower.exe4.2.drBinary or memory string: \autorun.inf
              Source: Explower.exe4.2.drBinary or memory string: [autorun]
              Source: Explower.exe4.2.drBinary or memory string: autorun.inf
              Source: Explower.exe0.2.drBinary or memory string: \autorun.inf
              Source: Explower.exe0.2.drBinary or memory string: [autorun]
              Source: Explower.exe0.2.drBinary or memory string: autorun.inf
              Source: 364d88128926b2e822553333b20c197fWindows Update.exe.2.drBinary or memory string: \autorun.inf
              Source: 364d88128926b2e822553333b20c197fWindows Update.exe.2.drBinary or memory string: [autorun]
              Source: 364d88128926b2e822553333b20c197fWindows Update.exe.2.drBinary or memory string: autorun.inf
              Source: Explower.exe8.2.drBinary or memory string: \autorun.inf
              Source: Explower.exe8.2.drBinary or memory string: [autorun]
              Source: Explower.exe8.2.drBinary or memory string: autorun.inf
              Source: Umbrella.flv.exe.2.drBinary or memory string: \autorun.inf
              Source: Umbrella.flv.exe.2.drBinary or memory string: [autorun]
              Source: Umbrella.flv.exe.2.drBinary or memory string: autorun.inf
              Source: server.exe.0.drBinary or memory string: \autorun.inf
              Source: server.exe.0.drBinary or memory string: [autorun]
              Source: server.exe.0.drBinary or memory string: autorun.inf
              Source: Explower.exe1.2.drBinary or memory string: \autorun.inf
              Source: Explower.exe1.2.drBinary or memory string: [autorun]
              Source: Explower.exe1.2.drBinary or memory string: autorun.inf
              Source: Explower.exe.2.drBinary or memory string: \autorun.inf
              Source: Explower.exe.2.drBinary or memory string: [autorun]
              Source: Explower.exe.2.drBinary or memory string: autorun.inf
              Source: Explower.exe3.2.drBinary or memory string: \autorun.inf
              Source: Explower.exe3.2.drBinary or memory string: [autorun]
              Source: Explower.exe3.2.drBinary or memory string: autorun.inf
              Source: Explower.exe6.2.drBinary or memory string: \autorun.inf
              Source: Explower.exe6.2.drBinary or memory string: [autorun]
              Source: Explower.exe6.2.drBinary or memory string: autorun.inf
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exeFile opened: C:\Users\user\AppData\Jump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exeFile opened: C:\Users\user\Jump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Jump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Jump to behavior

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:49705 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:49705 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:49709 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:49704 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:49704 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:49709 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:49707 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:49706 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:49707 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:49706 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:49735 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:49735 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:49718 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:49718 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:49762 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:49762 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:49788 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:49788 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:49803 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:49803 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:49819 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:49819 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:49833 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:49777 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:49777 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:49833 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:49748 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:49748 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:49849 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:49849 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2825564 - Severity 1 - ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act) : 192.168.2.5:49833 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:49910 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:49910 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:49881 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:49881 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:49897 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:49897 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:49978 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:49978 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:49928 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:49943 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:49928 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:49943 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2825564 - Severity 1 - ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act) : 192.168.2.5:49943 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:49991 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:49991 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:49865 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:50001 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:50001 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:50000 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:50000 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:50012 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:49998 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:50008 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:49865 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:50012 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:50006 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:50006 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:49998 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:50016 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:50007 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:50008 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:50018 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:50018 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:49999 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:50007 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:50023 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:49999 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:50023 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:50011 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:50031 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:50025 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:50011 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:50016 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:50025 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:50031 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:50036 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:50009 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:50033 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:50033 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:50021 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:50039 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:50036 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:50049 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:50021 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:50039 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:50020 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:50020 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:50017 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:50047 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:50041 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:50043 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:50041 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:50043 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:50027 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:50049 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:50050 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:50051 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:50002 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:50051 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:50005 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:50002 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:50005 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:50032 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:50032 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:50009 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:50047 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:50013 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:50034 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:50019 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:50034 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:50010 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:50019 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:50010 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:50038 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:50038 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:50050 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:49962 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:50048 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:50026 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:50048 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:49962 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:50014 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:50014 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:50044 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:50044 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:50017 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:50052 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:50052 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:50028 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:50027 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:50026 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:50004 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:50045 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:50029 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:50037 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:50045 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:50013 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:50046 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:50046 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:50042 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:50042 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:50004 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:50024 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:50037 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:50024 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:50029 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:50030 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:50030 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:50040 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:50040 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:50035 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:50035 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:50028 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:50003 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:50003 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:50015 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:50015 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:50022 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.5:50022 -> 178.215.236.227:4411
              Source: Network trafficSuricata IDS: 2825564 - Severity 1 - ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act) : 192.168.2.5:50022 -> 178.215.236.227:4411
              Source: global trafficTCP traffic: 192.168.2.5:49704 -> 178.215.236.227:4411
              Source: Joe Sandbox ViewASN Name: LVLT-10753US LVLT-10753US
              Source: unknownTCP traffic detected without corresponding DNS query: 178.215.236.227
              Source: unknownTCP traffic detected without corresponding DNS query: 178.215.236.227
              Source: unknownTCP traffic detected without corresponding DNS query: 178.215.236.227
              Source: unknownTCP traffic detected without corresponding DNS query: 178.215.236.227
              Source: unknownTCP traffic detected without corresponding DNS query: 178.215.236.227
              Source: unknownTCP traffic detected without corresponding DNS query: 178.215.236.227
              Source: unknownTCP traffic detected without corresponding DNS query: 178.215.236.227
              Source: unknownTCP traffic detected without corresponding DNS query: 178.215.236.227
              Source: unknownTCP traffic detected without corresponding DNS query: 178.215.236.227
              Source: unknownTCP traffic detected without corresponding DNS query: 178.215.236.227
              Source: unknownTCP traffic detected without corresponding DNS query: 178.215.236.227
              Source: unknownTCP traffic detected without corresponding DNS query: 178.215.236.227
              Source: unknownTCP traffic detected without corresponding DNS query: 178.215.236.227
              Source: unknownTCP traffic detected without corresponding DNS query: 178.215.236.227
              Source: unknownTCP traffic detected without corresponding DNS query: 178.215.236.227
              Source: unknownTCP traffic detected without corresponding DNS query: 178.215.236.227
              Source: unknownTCP traffic detected without corresponding DNS query: 178.215.236.227
              Source: unknownTCP traffic detected without corresponding DNS query: 178.215.236.227
              Source: unknownTCP traffic detected without corresponding DNS query: 178.215.236.227
              Source: unknownTCP traffic detected without corresponding DNS query: 178.215.236.227
              Source: unknownTCP traffic detected without corresponding DNS query: 178.215.236.227
              Source: unknownTCP traffic detected without corresponding DNS query: 178.215.236.227
              Source: unknownTCP traffic detected without corresponding DNS query: 178.215.236.227
              Source: unknownTCP traffic detected without corresponding DNS query: 178.215.236.227
              Source: unknownTCP traffic detected without corresponding DNS query: 178.215.236.227
              Source: unknownTCP traffic detected without corresponding DNS query: 178.215.236.227
              Source: unknownTCP traffic detected without corresponding DNS query: 178.215.236.227
              Source: unknownTCP traffic detected without corresponding DNS query: 178.215.236.227
              Source: unknownTCP traffic detected without corresponding DNS query: 178.215.236.227
              Source: unknownTCP traffic detected without corresponding DNS query: 178.215.236.227
              Source: unknownTCP traffic detected without corresponding DNS query: 178.215.236.227
              Source: unknownTCP traffic detected without corresponding DNS query: 178.215.236.227
              Source: unknownTCP traffic detected without corresponding DNS query: 178.215.236.227
              Source: unknownTCP traffic detected without corresponding DNS query: 178.215.236.227
              Source: unknownTCP traffic detected without corresponding DNS query: 178.215.236.227
              Source: unknownTCP traffic detected without corresponding DNS query: 178.215.236.227
              Source: unknownTCP traffic detected without corresponding DNS query: 178.215.236.227
              Source: unknownTCP traffic detected without corresponding DNS query: 178.215.236.227
              Source: unknownTCP traffic detected without corresponding DNS query: 178.215.236.227
              Source: unknownTCP traffic detected without corresponding DNS query: 178.215.236.227
              Source: unknownTCP traffic detected without corresponding DNS query: 178.215.236.227
              Source: unknownTCP traffic detected without corresponding DNS query: 178.215.236.227
              Source: unknownTCP traffic detected without corresponding DNS query: 178.215.236.227
              Source: unknownTCP traffic detected without corresponding DNS query: 178.215.236.227
              Source: unknownTCP traffic detected without corresponding DNS query: 178.215.236.227
              Source: unknownTCP traffic detected without corresponding DNS query: 178.215.236.227
              Source: unknownTCP traffic detected without corresponding DNS query: 178.215.236.227
              Source: unknownTCP traffic detected without corresponding DNS query: 178.215.236.227
              Source: unknownTCP traffic detected without corresponding DNS query: 178.215.236.227
              Source: unknownTCP traffic detected without corresponding DNS query: 178.215.236.227
              Source: Explower.exe, 0000000F.00000002.2385063463.00000000010EE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://go.micros
              Source: server.exe, 00000002.00000002.4479035775.0000000000E17000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://go.microsoft.
              Source: server.exe, 00000002.00000002.4479035775.0000000000E17000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://go.microsoft.LinkId=42127
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
              Source: C:\Users\user\server.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: Gv10VZCeN7.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.Gv10VZCeN7.exe.620000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.2050391420.0000000003CD8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000000.2026002461.0000000000622000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Gv10VZCeN7.exe PID: 4208, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: server.exe PID: 5252, type: MEMORYSTR
              Source: Yara matchFile source: C:\Program Files (x86)\Explower.exe, type: DROPPED
              Source: Yara matchFile source: C:\Notepad.exe, type: DROPPED
              Source: Yara matchFile source: C:\Umbrella.flv.exe, type: DROPPED
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exe, type: DROPPED
              Source: Yara matchFile source: C:\Users\user\server.exe, type: DROPPED
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exe, type: DROPPED

              System Summary

              barindex
              Source: Gv10VZCeN7.exe, type: SAMPLEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
              Source: Gv10VZCeN7.exe, type: SAMPLEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
              Source: Gv10VZCeN7.exe, type: SAMPLEMatched rule: Detects njRAT based on some strings Author: Sekoia.io
              Source: Gv10VZCeN7.exe, type: SAMPLEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
              Source: Gv10VZCeN7.exe, type: SAMPLEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: 0.0.Gv10VZCeN7.exe.620000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
              Source: 0.0.Gv10VZCeN7.exe.620000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
              Source: 0.0.Gv10VZCeN7.exe.620000.0.unpack, type: UNPACKEDPEMatched rule: Detects njRAT based on some strings Author: Sekoia.io
              Source: 0.0.Gv10VZCeN7.exe.620000.0.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
              Source: 0.0.Gv10VZCeN7.exe.620000.0.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: 00000000.00000002.2050391420.0000000003CD8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
              Source: 00000000.00000002.2050391420.0000000003CD8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
              Source: 00000000.00000000.2026002461.0000000000622000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
              Source: 00000000.00000000.2026002461.0000000000622000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects njRAT based on some strings Author: Sekoia.io
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects njRAT based on some strings Author: Sekoia.io
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects njRAT based on some strings Author: Sekoia.io
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects njRAT based on some strings Author: Sekoia.io
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects njRAT based on some strings Author: Sekoia.io
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects njRAT based on some strings Author: Sekoia.io
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Umbrella.flv.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
              Source: C:\Umbrella.flv.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
              Source: C:\Users\user\server.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exe, type: DROPPEDMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exe, type: DROPPEDMatched rule: Detects njRAT based on some strings Author: Sekoia.io
              Source: C:\Umbrella.flv.exe, type: DROPPEDMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
              Source: C:\Umbrella.flv.exe, type: DROPPEDMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
              Source: C:\Users\user\server.exe, type: DROPPEDMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
              Source: C:\Users\user\server.exe, type: DROPPEDMatched rule: Detects njRAT based on some strings Author: Sekoia.io
              Source: C:\Users\user\server.exe, type: DROPPEDMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
              Source: C:\Users\user\server.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Umbrella.flv.exe, type: DROPPEDMatched rule: Detects njRAT based on some strings Author: Sekoia.io
              Source: C:\Umbrella.flv.exe, type: DROPPEDMatched rule: Detects njRAT based on some strings Author: Sekoia.io
              Source: C:\Umbrella.flv.exe, type: DROPPEDMatched rule: Detects njRAT based on some strings Author: Sekoia.io
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exe, type: DROPPEDMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Umbrella.flv.exe, type: DROPPEDMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
              Source: C:\Umbrella.flv.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exe, type: DROPPEDMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exe, type: DROPPEDMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exe, type: DROPPEDMatched rule: Detects njRAT based on some strings Author: Sekoia.io
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exe, type: DROPPEDMatched rule: Detects njRAT based on some strings Author: Sekoia.io
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exe, type: DROPPEDMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exe, type: DROPPEDMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Users\user\server.exeProcess Stats: CPU usage > 49%
              Source: C:\Users\user\server.exeCode function: 2_2_00CDBF22 NtQuerySystemInformation,2_2_00CDBF22
              Source: C:\Users\user\server.exeCode function: 2_2_00CDBEF1 NtQuerySystemInformation,2_2_00CDBEF1
              Source: C:\Users\user\server.exeFile created: C:\Windows\SysWOW64\Explower.exeJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeCode function: 0_2_04DF42900_2_04DF4290
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeCode function: 0_2_04DF50DB0_2_04DF50DB
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeCode function: 0_2_04DF50550_2_04DF5055
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeCode function: 0_2_04DF4B530_2_04DF4B53
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeCode function: 0_2_04DF47CC0_2_04DF47CC
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeCode function: 0_2_04DF427F0_2_04DF427F
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeCode function: 0_2_04DF4FF80_2_04DF4FF8
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeCode function: 0_2_04DF49F10_2_04DF49F1
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeCode function: 0_2_04DF44E90_2_04DF44E9
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeCode function: 0_2_04DF53670_2_04DF5367
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeCode function: 0_2_04DF4F950_2_04DF4F95
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeCode function: 0_2_04DF49950_2_04DF4995
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeCode function: 0_2_04DF47070_2_04DF4707
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeCode function: 0_2_04DF4C870_2_04DF4C87
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeCode function: 0_2_04DF453C0_2_04DF453C
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeCode function: 0_2_04DF492E0_2_04DF492E
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeCode function: 0_2_04DF46280_2_04DF4628
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeCode function: 0_2_04DF4F270_2_04DF4F27
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeCode function: 0_2_04DF54510_2_04DF5451
              Source: C:\Users\user\server.exeCode function: 2_2_04EC7AA02_2_04EC7AA0
              Source: C:\Users\user\server.exeCode function: 2_2_04EC42982_2_04EC4298
              Source: C:\Users\user\server.exeCode function: 2_2_04EC76672_2_04EC7667
              Source: C:\Users\user\server.exeCode function: 2_2_04EC49F92_2_04EC49F9
              Source: C:\Users\user\server.exeCode function: 2_2_04EC44F12_2_04EC44F1
              Source: C:\Users\user\server.exeCode function: 2_2_04EC47D42_2_04EC47D4
              Source: C:\Users\user\server.exeCode function: 2_2_04EC499D2_2_04EC499D
              Source: C:\Users\user\server.exeCode function: 2_2_04EC42692_2_04EC4269
              Source: C:\Users\user\server.exeCode function: 2_2_04EC45442_2_04EC4544
              Source: C:\Users\user\server.exeCode function: 2_2_04EC4B5B2_2_04EC4B5B
              Source: C:\Users\user\server.exeCode function: 2_2_04EC49362_2_04EC4936
              Source: C:\Users\user\server.exeCode function: 2_2_04EC46302_2_04EC4630
              Source: C:\Users\user\server.exeCode function: 2_2_04EC470F2_2_04EC470F
              Source: C:\Users\user\server.exeCode function: 2_2_04EC50E32_2_04EC50E3
              Source: C:\Users\user\server.exeCode function: 2_2_04EC4C8F2_2_04EC4C8F
              Source: C:\Users\user\server.exeCode function: 2_2_04EC4F9D2_2_04EC4F9D
              Source: C:\Users\user\server.exeCode function: 2_2_04EC536F2_2_04EC536F
              Source: C:\Users\user\server.exeCode function: 2_2_04EC505D2_2_04EC505D
              Source: C:\Users\user\server.exeCode function: 2_2_04EC54592_2_04EC5459
              Source: C:\Users\user\server.exeCode function: 2_2_04EC4F2F2_2_04EC4F2F
              Source: C:\Users\user\server.exeCode function: 2_2_04EC50002_2_04EC5000
              Source: Gv10VZCeN7.exe, 00000000.00000002.2049173719.0000000000A1E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs Gv10VZCeN7.exe
              Source: Gv10VZCeN7.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: Gv10VZCeN7.exe, type: SAMPLEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
              Source: Gv10VZCeN7.exe, type: SAMPLEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: Gv10VZCeN7.exe, type: SAMPLEMatched rule: crimeware_njrat_strings author = Sekoia.io, description = Detects njRAT based on some strings, creation_date = 2022-08-22, classification = TLP:CLEAR, version = 1.0, id = 215807ae-fbcb-478d-8941-e0787b883669
              Source: Gv10VZCeN7.exe, type: SAMPLEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
              Source: Gv10VZCeN7.exe, type: SAMPLEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: 0.0.Gv10VZCeN7.exe.620000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
              Source: 0.0.Gv10VZCeN7.exe.620000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.0.Gv10VZCeN7.exe.620000.0.unpack, type: UNPACKEDPEMatched rule: crimeware_njrat_strings author = Sekoia.io, description = Detects njRAT based on some strings, creation_date = 2022-08-22, classification = TLP:CLEAR, version = 1.0, id = 215807ae-fbcb-478d-8941-e0787b883669
              Source: 0.0.Gv10VZCeN7.exe.620000.0.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
              Source: 0.0.Gv10VZCeN7.exe.620000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: 00000000.00000002.2050391420.0000000003CD8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
              Source: 00000000.00000002.2050391420.0000000003CD8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
              Source: 00000000.00000000.2026002461.0000000000622000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
              Source: 00000000.00000000.2026002461.0000000000622000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: crimeware_njrat_strings author = Sekoia.io, description = Detects njRAT based on some strings, creation_date = 2022-08-22, classification = TLP:CLEAR, version = 1.0, id = 215807ae-fbcb-478d-8941-e0787b883669
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Program Files (x86)\Explower.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: crimeware_njrat_strings author = Sekoia.io, description = Detects njRAT based on some strings, creation_date = 2022-08-22, classification = TLP:CLEAR, version = 1.0, id = 215807ae-fbcb-478d-8941-e0787b883669
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: crimeware_njrat_strings author = Sekoia.io, description = Detects njRAT based on some strings, creation_date = 2022-08-22, classification = TLP:CLEAR, version = 1.0, id = 215807ae-fbcb-478d-8941-e0787b883669
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: crimeware_njrat_strings author = Sekoia.io, description = Detects njRAT based on some strings, creation_date = 2022-08-22, classification = TLP:CLEAR, version = 1.0, id = 215807ae-fbcb-478d-8941-e0787b883669
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: crimeware_njrat_strings author = Sekoia.io, description = Detects njRAT based on some strings, creation_date = 2022-08-22, classification = TLP:CLEAR, version = 1.0, id = 215807ae-fbcb-478d-8941-e0787b883669
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: crimeware_njrat_strings author = Sekoia.io, description = Detects njRAT based on some strings, creation_date = 2022-08-22, classification = TLP:CLEAR, version = 1.0, id = 215807ae-fbcb-478d-8941-e0787b883669
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Notepad.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Umbrella.flv.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
              Source: C:\Umbrella.flv.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
              Source: C:\Users\user\server.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exe, type: DROPPEDMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exe, type: DROPPEDMatched rule: crimeware_njrat_strings author = Sekoia.io, description = Detects njRAT based on some strings, creation_date = 2022-08-22, classification = TLP:CLEAR, version = 1.0, id = 215807ae-fbcb-478d-8941-e0787b883669
              Source: C:\Umbrella.flv.exe, type: DROPPEDMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: C:\Umbrella.flv.exe, type: DROPPEDMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: C:\Users\user\server.exe, type: DROPPEDMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: C:\Users\user\server.exe, type: DROPPEDMatched rule: crimeware_njrat_strings author = Sekoia.io, description = Detects njRAT based on some strings, creation_date = 2022-08-22, classification = TLP:CLEAR, version = 1.0, id = 215807ae-fbcb-478d-8941-e0787b883669
              Source: C:\Users\user\server.exe, type: DROPPEDMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
              Source: C:\Users\user\server.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Umbrella.flv.exe, type: DROPPEDMatched rule: crimeware_njrat_strings author = Sekoia.io, description = Detects njRAT based on some strings, creation_date = 2022-08-22, classification = TLP:CLEAR, version = 1.0, id = 215807ae-fbcb-478d-8941-e0787b883669
              Source: C:\Umbrella.flv.exe, type: DROPPEDMatched rule: crimeware_njrat_strings author = Sekoia.io, description = Detects njRAT based on some strings, creation_date = 2022-08-22, classification = TLP:CLEAR, version = 1.0, id = 215807ae-fbcb-478d-8941-e0787b883669
              Source: C:\Umbrella.flv.exe, type: DROPPEDMatched rule: crimeware_njrat_strings author = Sekoia.io, description = Detects njRAT based on some strings, creation_date = 2022-08-22, classification = TLP:CLEAR, version = 1.0, id = 215807ae-fbcb-478d-8941-e0787b883669
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exe, type: DROPPEDMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Umbrella.flv.exe, type: DROPPEDMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
              Source: C:\Umbrella.flv.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exe, type: DROPPEDMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exe, type: DROPPEDMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exe, type: DROPPEDMatched rule: crimeware_njrat_strings author = Sekoia.io, description = Detects njRAT based on some strings, creation_date = 2022-08-22, classification = TLP:CLEAR, version = 1.0, id = 215807ae-fbcb-478d-8941-e0787b883669
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exe, type: DROPPEDMatched rule: crimeware_njrat_strings author = Sekoia.io, description = Detects njRAT based on some strings, creation_date = 2022-08-22, classification = TLP:CLEAR, version = 1.0, id = 215807ae-fbcb-478d-8941-e0787b883669
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exe, type: DROPPEDMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exe, type: DROPPEDMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: classification engineClassification label: mal100.spre.phis.troj.adwa.evad.winEXE@16/24@0/1
              Source: C:\Users\user\server.exeCode function: 2_2_00CDBDA6 AdjustTokenPrivileges,2_2_00CDBDA6
              Source: C:\Users\user\server.exeCode function: 2_2_00CDBD6F AdjustTokenPrivileges,2_2_00CDBD6F
              Source: C:\Users\user\server.exeFile created: C:\Program Files (x86)\Explower.exeJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeFile created: C:\Users\user\AppData\Roaming\appJump to behavior
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2128:120:WilError_03
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeMutant created: NULL
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5440:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2828:120:WilError_03
              Source: C:\Users\user\server.exeMutant created: \Sessions\1\BaseNamedObjects\364d88128926b2e822553333b20c197f
              Source: C:\Users\user\server.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeFile created: C:\Users\user\AppData\Local\Temp\FransescoPast.txtJump to behavior
              Source: Gv10VZCeN7.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: Gv10VZCeN7.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: Gv10VZCeN7.exeVirustotal: Detection: 70%
              Source: Gv10VZCeN7.exeReversingLabs: Detection: 95%
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeFile read: C:\Users\user\Desktop\Gv10VZCeN7.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\Gv10VZCeN7.exe "C:\Users\user\Desktop\Gv10VZCeN7.exe"
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeProcess created: C:\Users\user\server.exe "C:\Users\user\server.exe"
              Source: C:\Users\user\server.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\server.exe" "server.exe" ENABLE
              Source: C:\Windows\SysWOW64\netsh.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\server.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall delete allowedprogram "C:\Users\user\server.exe"
              Source: C:\Users\user\server.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\server.exe" "server.exe" ENABLE
              Source: C:\Windows\SysWOW64\netsh.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\netsh.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exe "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exe"
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exe "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exe"
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exe "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exe"
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe"
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeProcess created: C:\Users\user\server.exe "C:\Users\user\server.exe" Jump to behavior
              Source: C:\Users\user\server.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\server.exe" "server.exe" ENABLEJump to behavior
              Source: C:\Users\user\server.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall delete allowedprogram "C:\Users\user\server.exe"Jump to behavior
              Source: C:\Users\user\server.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\server.exe" "server.exe" ENABLEJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeSection loaded: shfolder.dllJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeSection loaded: slc.dllJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Users\user\server.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\server.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\server.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\server.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\server.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\server.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\server.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\server.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\server.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Users\user\server.exeSection loaded: shfolder.dllJump to behavior
              Source: C:\Users\user\server.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Users\user\server.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\server.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\server.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\server.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\server.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\server.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Users\user\server.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\server.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ifmon.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasmontr.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasapi32.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mfc42u.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: authfwcfg.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpolicyiomgr.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: firewallapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcmonitor.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3cfg.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3api.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: onex.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappcfg.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappprxy.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwcfg.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: hnetmon.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netshell.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nlaapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netsetupapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netiohlp.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshhttp.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: httpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshipsec.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: activeds.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: polstore.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winipsec.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: adsldpc.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshwfp.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cabinet.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2pnetsh.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2p.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rpcnsh.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: whhelper.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlancfg.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlanapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wshelper.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wevtapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: peerdistsh.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wcmapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rmclient.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mobilenetworking.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: slc.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ktmw32.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprmsg.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ifmon.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasmontr.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasapi32.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mfc42u.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: authfwcfg.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpolicyiomgr.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: firewallapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcmonitor.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3cfg.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3api.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: onex.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappcfg.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappprxy.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwcfg.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: hnetmon.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netshell.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nlaapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netsetupapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netiohlp.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshhttp.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: httpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshipsec.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: activeds.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: polstore.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winipsec.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: adsldpc.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshwfp.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cabinet.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2pnetsh.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2p.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rpcnsh.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: whhelper.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlancfg.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlanapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wshelper.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wevtapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: peerdistsh.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wcmapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rmclient.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mobilenetworking.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: slc.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ktmw32.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprmsg.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ifmon.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasmontr.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasapi32.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mfc42u.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: authfwcfg.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpolicyiomgr.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: firewallapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcmonitor.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3cfg.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3api.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: onex.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappcfg.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappprxy.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwcfg.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: hnetmon.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netshell.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nlaapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netsetupapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netiohlp.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshhttp.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: httpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshipsec.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: activeds.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: polstore.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winipsec.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: adsldpc.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: adsldpc.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshwfp.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cabinet.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2pnetsh.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2p.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rpcnsh.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: whhelper.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlancfg.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlanapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wshelper.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wevtapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: peerdistsh.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wcmapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rmclient.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mobilenetworking.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: slc.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ktmw32.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprmsg.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeSection loaded: acgenral.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeSection loaded: samcli.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeSection loaded: msacm32.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeSection loaded: dwmapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeSection loaded: winmmbase.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeSection loaded: winmmbase.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeSection loaded: aclayers.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeSection loaded: shfolder.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exeSection loaded: shfolder.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeSection loaded: shfolder.dllJump to behavior
              Source: C:\Users\user\server.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{674B6698-EE92-11D0-AD71-00C04FD8FDFF}\InprocServer32Jump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dllJump to behavior
              Source: Gv10VZCeN7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
              Source: Gv10VZCeN7.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

              Persistence and Installation Behavior

              barindex
              Source: C:\Users\user\server.exeFile created: C:\Users\user\Documents\Explower.exeJump to dropped file
              Source: C:\Users\user\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeJump to dropped file
              Source: C:\Users\user\server.exeFile created: C:\Users\user\Desktop\Explower.exeJump to dropped file
              Source: C:\Users\user\server.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\Explower.exeJump to dropped file
              Source: C:\Users\user\server.exeFile created: C:\Notepad.exeJump to dropped file
              Source: C:\Users\user\server.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\History\Explower.exeJump to dropped file
              Source: C:\Users\user\server.exeFile created: C:\Windows\SysWOW64\Explower.exeJump to dropped file
              Source: C:\Users\user\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeJump to dropped file
              Source: C:\Users\user\server.exeFile created: C:\Program Files (x86)\Explower.exeJump to dropped file
              Source: C:\Users\user\server.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Explower.exeJump to dropped file
              Source: C:\Users\user\server.exeFile created: C:\Users\user\AppData\Local\Explower.exeJump to dropped file
              Source: C:\Users\user\server.exeFile created: C:\Umbrella.flv.exeJump to dropped file
              Source: C:\Users\user\server.exeFile created: C:\Users\user\Favorites\Explower.exeJump to dropped file
              Source: C:\Users\user\server.exeFile created: C:\Users\user\Documents\Explower.exeJump to dropped file
              Source: C:\Users\user\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exeJump to dropped file
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeFile created: C:\Users\user\server.exeJump to dropped file
              Source: C:\Users\user\server.exeFile created: C:\Program Files (x86)\Explower.exeJump to dropped file
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeFile created: C:\Users\user\server.exeJump to dropped file
              Source: C:\Users\user\server.exeFile created: C:\Windows\SysWOW64\Explower.exeJump to dropped file

              Boot Survival

              barindex
              Source: C:\Users\user\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeJump to dropped file
              Source: C:\Users\user\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeJump to dropped file
              Source: C:\Users\user\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exeJump to dropped file
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeFile created: C:\Users\user\server.exeJump to dropped file
              Source: C:\Users\user\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exeJump to behavior
              Source: C:\Users\user\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exeJump to behavior
              Source: C:\Users\user\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeJump to behavior
              Source: C:\Users\user\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeMemory allocated: E50000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeMemory allocated: 2CD0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeMemory allocated: FD0000 memory commit | memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: D40000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 2D20000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 4D20000 memory commit | memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 5F90000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 6F90000 memory commit | memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 70C0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 83C0000 memory commit | memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 8620000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 9620000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: A620000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: B620000 memory commit | memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: BAD0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: BAD0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: CAD0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: DAD0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: EAD0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: FAD0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 10AD0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 11AD0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 12AD0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: A800000 memory commit | memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 13AD0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 14AD0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 15AD0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 16AD0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 17AD0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 15AD0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 18AD0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 19AD0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 1AAD0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 1BAD0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 1CAD0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 1DAD0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 1EAD0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 1FAD0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 20AD0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: B2A0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: B6E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: B820000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: C5E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: D5E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: E5E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: F5E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 105E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 115E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 125E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 135E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 145E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 155E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 165E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 175E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 185E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 195E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 1A5E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 1B5E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 1C5E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 1D5E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 1E5E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 1F5E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 205E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 215E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 225E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 235E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 245E0000 memory commit | memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 25890000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 26890000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 27890000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 28890000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 29890000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 2A890000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 2B890000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 2C890000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 2D890000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 2E890000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 2F890000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 30890000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 31890000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 32890000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 33890000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 34890000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 35890000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 36890000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 37890000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 38890000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 116E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 126E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: CE60000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: DE60000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 136E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 146E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: D4A0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: D720000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: E720000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: F720000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 156E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 166E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 176E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\server.exeMemory allocated: 186E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeMemory allocated: C30000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeMemory allocated: 2C80000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeMemory allocated: 2840000 memory commit | memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exeMemory allocated: 11E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exeMemory allocated: 2E60000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exeMemory allocated: 4E60000 memory commit | memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeMemory allocated: 1370000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeMemory allocated: 2FD0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeMemory allocated: 4FD0000 memory commit | memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\server.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\server.exeWindow / User API: threadDelayed 2833Jump to behavior
              Source: C:\Users\user\server.exeWindow / User API: threadDelayed 1844Jump to behavior
              Source: C:\Users\user\server.exeWindow / User API: foregroundWindowGot 477Jump to behavior
              Source: C:\Users\user\server.exeWindow / User API: foregroundWindowGot 502Jump to behavior
              Source: C:\Users\user\server.exeWindow / User API: foregroundWindowGot 359Jump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exe TID: 7084Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\server.exe TID: 4028Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\server.exe TID: 5752Thread sleep time: -1416500s >= -30000sJump to behavior
              Source: C:\Users\user\server.exe TID: 5592Thread sleep time: -30000s >= -30000sJump to behavior
              Source: C:\Users\user\server.exe TID: 5752Thread sleep time: -922000s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exe TID: 2956Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exe TID: 6152Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe TID: 2284Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\server.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exeFile opened: C:\Users\user\AppData\Jump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exeFile opened: C:\Users\user\Jump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Jump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Jump to behavior
              Source: netsh.exe, 00000005.00000003.2115220192.0000000000B31000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll;
              Source: netsh.exe, 00000006.00000002.2139559727.000000000060A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll0
              Source: Gv10VZCeN7.exe, 00000000.00000002.2049173719.0000000000AA6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}|A
              Source: server.exe, 00000002.00000002.4479035775.0000000000E17000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000003.00000003.2070019618.0000000000BC1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Users\user\server.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\server.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeMemory allocated: page read and write | page guardJump to behavior
              Source: C:\Users\user\Desktop\Gv10VZCeN7.exeProcess created: C:\Users\user\server.exe "C:\Users\user\server.exe" Jump to behavior
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 22:23:35 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 22:22:03 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 22:24:34 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/14 | 17:02:23 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 22:22:23 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/12 | 12:02:43 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 22:22:36 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/14 | 18:11:18 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/14 | 17:51:00 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 22:22:51 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 22:22:56 - Program Manager
              Source: server.exe, 00000002.00000002.4478833737.0000000000DE1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Rh Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 23:12:21 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 22:23:14 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 22:24:26 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/12 | 06:51:53 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 22:22:02 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 22:24:42 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/12 | 10:31:35 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/14 | 18:34:39 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/12 | 11:50:24 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 22:22:52 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 22:25:21 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 23:53:14 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 22:22:55 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 23:38:45 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 22:22:42 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/14 | 18:57:00 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/14 | 17:02:52 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 22:24:18 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/12 | 10:04:00 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 22:23:26 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/14 | 18:27:48 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 22:23:46 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 22:22:14 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 22:22:34 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 22:22:44 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 22:22:53 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/14 | 19:23:38 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/12 | 05:17:36 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/12 | 11:40:10 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 22:22:13 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/12 | 07:44:30 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 23:10:18 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 22:27:00 - Program Manager
              Source: Gv10VZCeN7.exe, 00000000.00000002.2050647648.000000000505B000.00000004.00000010.00020000.00000000.sdmp, Gv10VZCeN7.exe, 00000000.00000002.2050289009.0000000002D03000.00000004.00000800.00020000.00000000.sdmp, Gv10VZCeN7.exe, 00000000.00000002.2050289009.0000000002CD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
              Source: Gv10VZCeN7.exe, Discord.exe.2.dr, Notepad.exe.2.dr, Explower.exe7.2.dr, Explower.exe2.2.dr, Explower.exe5.2.dr, Explower.exe4.2.dr, Explower.exe0.2.dr, 364d88128926b2e822553333b20c197fWindows Update.exe.2.dr, Explower.exe8.2.dr, Umbrella.flv.exe.2.drBinary or memory string: ProgMan
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 178.215.236.22724 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/14 | 17:03:04 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 22:22:41 - Program Manager
              Source: Gv10VZCeN7.exe, 00000000.00000002.2050289009.0000000002D03000.00000004.00000800.00020000.00000000.sdmp, Gv10VZCeN7.exe, 00000000.00000002.2050289009.0000000002CD1000.00000004.00000800.00020000.00000000.sdmp, Gv10VZCeN7.exe, 00000000.00000002.2050289009.0000000002D0A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: kedProgram Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 22:24:09 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 22:22:59 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/12 | 11:00:05 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 23:31:02 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 22:23:00 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 22:22:12 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/12 | 10:12:25 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 22:22:45 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 22:26:19 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 22:22:58 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/14 | 18:06:28 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/14 | 18:17:43 - Program Manager
              Source: Gv10VZCeN7.exe, Discord.exe.2.dr, Notepad.exe.2.dr, Explower.exe7.2.dr, Explower.exe2.2.dr, Explower.exe5.2.dr, Explower.exe4.2.dr, Explower.exe0.2.dr, 364d88128926b2e822553333b20c197fWindows Update.exe.2.dr, Explower.exe8.2.dr, Umbrella.flv.exe.2.drBinary or memory string: Shell_traywnd+MostrarBarraDeTarefas
              Source: Gv10VZCeN7.exe, 00000000.00000002.2050647648.000000000505B000.00000004.00000010.00020000.00000000.sdmp, Discord.exe, 0000000E.00000002.2315852377.00000000052FB000.00000004.00000010.00020000.00000000.sdmp, Explower.exe, 0000000F.00000002.2407959456.00000000054BB000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: dProgram Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 22:24:05 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/14 | 18:26:41 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/14 | 19:35:03 - Program Manager
              Source: Gv10VZCeN7.exe, Discord.exe.2.dr, Notepad.exe.2.dr, Explower.exe7.2.dr, Explower.exe2.2.dr, Explower.exe5.2.dr, Explower.exe4.2.dr, Explower.exe0.2.dr, 364d88128926b2e822553333b20c197fWindows Update.exe.2.dr, Explower.exe8.2.dr, Umbrella.flv.exe.2.drBinary or memory string: Shell_TrayWnd
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 22:23:13 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 22:34:14 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/14 | 18:15:22 - Program Manager
              Source: Gv10VZCeN7.exe, 00000000.00000002.2050289009.0000000002D0A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 22:22:01 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 22:23:09 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 22:22:11 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 22:22:50 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/12 | 10:05:56 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 22:22:47 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 22:25:06 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/12 | 11:54:24 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/14 | 19:35:18 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 22:22:57 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/12 | 00:25:55 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 22:24:14 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/12 | 00:48:23 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/14 | 18:26:52 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/14 | 16:32:22 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 22:23:28 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/12 | 11:50:49 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 22:23:08 - Program Manager
              Source: server.exe, 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25/01/11 | 22:24:54 - Program Manager
              Source: C:\Windows\SysWOW64\netsh.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Users\user\server.exeCode function: 2_2_00CDA5EE GetUserNameW,2_2_00CDA5EE
              Source: C:\Users\user\server.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Lowering of HIPS / PFW / Operating System Security Settings

              barindex
              Source: C:\Users\user\server.exeRegistry key created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System DisableTaskMgrJump to behavior
              Source: C:\Users\user\server.exeRegistry value created: HKEY_CURRENT_USER\Environment SEE_MASK_NOZONECHECKSJump to behavior
              Source: C:\Users\user\server.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\server.exe" "server.exe" ENABLE
              Source: C:\Users\user\server.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\server.exe" "server.exe" ENABLE

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: Gv10VZCeN7.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.Gv10VZCeN7.exe.620000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.2050391420.0000000003CD8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000000.2026002461.0000000000622000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Gv10VZCeN7.exe PID: 4208, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: server.exe PID: 5252, type: MEMORYSTR
              Source: Yara matchFile source: C:\Program Files (x86)\Explower.exe, type: DROPPED
              Source: Yara matchFile source: C:\Notepad.exe, type: DROPPED
              Source: Yara matchFile source: C:\Umbrella.flv.exe, type: DROPPED
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exe, type: DROPPED
              Source: Yara matchFile source: C:\Users\user\server.exe, type: DROPPED
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exe, type: DROPPED

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: Gv10VZCeN7.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.Gv10VZCeN7.exe.620000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.2050391420.0000000003CD8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000000.2026002461.0000000000622000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Gv10VZCeN7.exe PID: 4208, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: server.exe PID: 5252, type: MEMORYSTR
              Source: Yara matchFile source: C:\Program Files (x86)\Explower.exe, type: DROPPED
              Source: Yara matchFile source: C:\Notepad.exe, type: DROPPED
              Source: Yara matchFile source: C:\Umbrella.flv.exe, type: DROPPED
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exe, type: DROPPED
              Source: Yara matchFile source: C:\Users\user\server.exe, type: DROPPED
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exe, type: DROPPED
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire Infrastructure11
              Replication Through Removable Media
              Windows Management Instrumentation12
              Registry Run Keys / Startup Folder
              1
              Access Token Manipulation
              142
              Masquerading
              OS Credential Dumping11
              Security Software Discovery
              Remote Services1
              Archive Collected Data
              1
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/Job1
              DLL Side-Loading
              12
              Process Injection
              41
              Disable or Modify Tools
              LSASS Memory2
              Process Discovery
              Remote Desktop Protocol1
              Clipboard Data
              1
              Non-Standard Port
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)12
              Registry Run Keys / Startup Folder
              31
              Virtualization/Sandbox Evasion
              Security Account Manager31
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
              DLL Side-Loading
              1
              Access Token Manipulation
              NTDS1
              Application Window Discovery
              Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script12
              Process Injection
              LSA Secrets1
              Peripheral Device Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              DLL Side-Loading
              Cached Domain Credentials1
              Account Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync1
              System Owner/User Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem2
              File and Directory Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow12
              System Information Discovery
              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 signatures2 2 Behavior Graph ID: 1589384 Sample: Gv10VZCeN7.exe Startdate: 12/01/2025 Architecture: WINDOWS Score: 100 49 Suricata IDS alerts for network traffic 2->49 51 Found malware configuration 2->51 53 Malicious sample detected (through community Yara rule) 2->53 55 8 other signatures 2->55 8 Gv10VZCeN7.exe 7 2->8         started        12 364d88128926b2e822553333b20c197fWindows Update.exe 3 2->12         started        14 Explower.exe 3 2->14         started        16 2 other processes 2->16 process3 file4 43 C:\Users\user\server.exe, PE32 8->43 dropped 45 C:\Users\user\AppData\...behaviorgraphv10VZCeN7.exe.log, ASCII 8->45 dropped 65 Drops PE files to the user root directory 8->65 18 server.exe 2 21 8->18         started        signatures5 process6 dnsIp7 47 178.215.236.227, 4411, 49704, 49705 LVLT-10753US Germany 18->47 35 C:\Windows\SysWOW64xplower.exe, PE32 18->35 dropped 37 C:\Users\user\Favoritesxplower.exe, PE32 18->37 dropped 39 C:\Users\user\Documentsxplower.exe, PE32 18->39 dropped 41 12 other malicious files 18->41 dropped 57 Antivirus detection for dropped file 18->57 59 Multi AV Scanner detection for dropped file 18->59 61 Drops PE files to the document folder of the user 18->61 63 7 other signatures 18->63 23 netsh.exe 2 18->23         started        25 netsh.exe 2 18->25         started        27 netsh.exe 2 18->27         started        file8 signatures9 process10 process11 29 conhost.exe 23->29         started        31 conhost.exe 25->31         started        33 conhost.exe 27->33         started       

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              Gv10VZCeN7.exe71%VirustotalBrowse
              Gv10VZCeN7.exe96%ReversingLabsByteCode-MSIL.Backdoor.njRAT
              Gv10VZCeN7.exe100%AviraTR/Dropper.Gen
              Gv10VZCeN7.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exe100%AviraTR/Dropper.Gen
              C:\Notepad.exe100%AviraTR/Dropper.Gen
              C:\Program Files (x86)\Explower.exe100%AviraTR/Dropper.Gen
              C:\Program Files (x86)\Explower.exe100%AviraTR/Dropper.Gen
              C:\Program Files (x86)\Explower.exe100%AviraTR/Dropper.Gen
              C:\Program Files (x86)\Explower.exe100%AviraTR/Dropper.Gen
              C:\Program Files (x86)\Explower.exe100%AviraTR/Dropper.Gen
              C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exe100%AviraTR/Dropper.Gen
              C:\Program Files (x86)\Explower.exe100%AviraTR/Dropper.Gen
              C:\Umbrella.flv.exe100%AviraTR/Dropper.Gen
              C:\Users\user\server.exe100%AviraTR/Dropper.Gen
              C:\Program Files (x86)\Explower.exe100%AviraTR/Dropper.Gen
              C:\Program Files (x86)\Explower.exe100%AviraTR/Dropper.Gen
              C:\Program Files (x86)\Explower.exe100%AviraTR/Dropper.Gen
              C:\Program Files (x86)\Explower.exe100%AviraTR/Dropper.Gen
              C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exe100%Joe Sandbox ML
              C:\Notepad.exe100%Joe Sandbox ML
              C:\Program Files (x86)\Explower.exe100%Joe Sandbox ML
              C:\Program Files (x86)\Explower.exe100%Joe Sandbox ML
              C:\Program Files (x86)\Explower.exe100%Joe Sandbox ML
              C:\Program Files (x86)\Explower.exe100%Joe Sandbox ML
              C:\Program Files (x86)\Explower.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exe100%Joe Sandbox ML
              C:\Program Files (x86)\Explower.exe100%Joe Sandbox ML
              C:\Umbrella.flv.exe100%Joe Sandbox ML
              C:\Users\user\server.exe100%Joe Sandbox ML
              C:\Program Files (x86)\Explower.exe100%Joe Sandbox ML
              C:\Program Files (x86)\Explower.exe100%Joe Sandbox ML
              C:\Program Files (x86)\Explower.exe100%Joe Sandbox ML
              C:\Program Files (x86)\Explower.exe100%Joe Sandbox ML
              C:\Notepad.exe96%ReversingLabsByteCode-MSIL.Backdoor.njRAT
              C:\Notepad.exe71%VirustotalBrowse
              C:\Program Files (x86)\Explower.exe96%ReversingLabsByteCode-MSIL.Backdoor.njRAT
              C:\Program Files (x86)\Explower.exe71%VirustotalBrowse
              C:\Umbrella.flv.exe96%ReversingLabsByteCode-MSIL.Backdoor.njRAT
              C:\Umbrella.flv.exe71%VirustotalBrowse
              C:\Users\user\AppData\Local\Explower.exe96%ReversingLabsByteCode-MSIL.Backdoor.njRAT
              C:\Users\user\AppData\Local\Explower.exe71%VirustotalBrowse
              C:\Users\user\AppData\Local\Microsoft\Windows\History\Explower.exe96%ReversingLabsByteCode-MSIL.Backdoor.njRAT
              C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Explower.exe96%ReversingLabsByteCode-MSIL.Backdoor.njRAT
              C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\Explower.exe96%ReversingLabsByteCode-MSIL.Backdoor.njRAT
              C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exe96%ReversingLabsByteCode-MSIL.Backdoor.njRAT
              C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exe96%ReversingLabsByteCode-MSIL.Backdoor.njRAT
              C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe96%ReversingLabsByteCode-MSIL.Backdoor.njRAT
              C:\Users\user\Desktop\Explower.exe96%ReversingLabsByteCode-MSIL.Backdoor.njRAT
              C:\Users\user\Documents\Explower.exe96%ReversingLabsByteCode-MSIL.Backdoor.njRAT
              C:\Users\user\Favorites\Explower.exe96%ReversingLabsByteCode-MSIL.Backdoor.njRAT
              C:\Users\user\server.exe96%ReversingLabsByteCode-MSIL.Backdoor.njRAT
              C:\Windows\SysWOW64\Explower.exe96%ReversingLabsByteCode-MSIL.Backdoor.njRAT
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              No contacted domains info
              NameSourceMaliciousAntivirus DetectionReputation
              http://go.microsoft.server.exe, 00000002.00000002.4479035775.0000000000E17000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                http://go.microsoft.LinkId=42127server.exe, 00000002.00000002.4479035775.0000000000E17000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  http://go.microsExplower.exe, 0000000F.00000002.2385063463.00000000010EE000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    178.215.236.227
                    unknownGermany
                    10753LVLT-10753UStrue
                    Joe Sandbox version:42.0.0 Malachite
                    Analysis ID:1589384
                    Start date and time:2025-01-12 04:21:10 +01:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 8m 9s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:16
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:1
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:Gv10VZCeN7.exe
                    renamed because original name is a hash value
                    Original Sample Name:1ed0c2e213e674c8a95694c9e19361c7.exe
                    Detection:MAL
                    Classification:mal100.spre.phis.troj.adwa.evad.winEXE@16/24@0/1
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 96%
                    • Number of executed functions: 173
                    • Number of non-executed functions: 17
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Override analysis time to 240000 for current running targets taking high CPU consumption
                    • Exclude process from analysis (whitelisted): dllhost.exe, consent.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                    • Excluded IPs from analysis (whitelisted): 20.109.210.53, 13.107.246.45
                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size exceeded maximum capacity and may have missing behavior information.
                    • Report size exceeded maximum capacity and may have missing disassembly code.
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    TimeTypeDescription
                    04:22:05AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exe
                    04:22:14AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exe
                    04:22:24AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe
                    22:22:44API Interceptor130885x Sleep call for process: server.exe modified
                    No context
                    No context
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    LVLT-10753UShttp://trustwallet.secure-configure.com/trst.phpGet hashmaliciousUnknownBrowse
                    • 178.215.224.142
                    https://trustwallet.secure-configure.com/trst.php/Get hashmaliciousUnknownBrowse
                    • 178.215.224.142
                    mhPGrMEkjq.exeGet hashmaliciousNjratBrowse
                    • 178.215.224.223
                    fqkjei686.elfGet hashmaliciousUnknownBrowse
                    • 178.215.238.112
                    wrjkngh4.elfGet hashmaliciousUnknownBrowse
                    • 178.215.238.112
                    vevhea4.elfGet hashmaliciousUnknownBrowse
                    • 178.215.238.112
                    qbfwdbg.elfGet hashmaliciousUnknownBrowse
                    • 178.215.238.112
                    wlw68k.elfGet hashmaliciousUnknownBrowse
                    • 178.215.238.112
                    ivwebcda7.elfGet hashmaliciousMiraiBrowse
                    • 178.215.238.112
                    fbhervbhsl.elfGet hashmaliciousUnknownBrowse
                    • 178.215.238.112
                    No context
                    No context
                    Process:C:\Users\user\server.exe
                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Category:dropped
                    Size (bytes):95232
                    Entropy (8bit):5.562169391138688
                    Encrypted:false
                    SSDEEP:768:/Y34G/jglPPMJI08+EyrERm9hX+JlwA461mXxrjEtCdnl2pi1Rz4Rk3qsGdpYgS7:RG7gdQ8+f4mXpA4tjEwzGi1dDGDYgS
                    MD5:1ED0C2E213E674C8A95694C9E19361C7
                    SHA1:05446E3404B3171264FC344BF4013EB8EA2CF740
                    SHA-256:6DFE16F82116F1537EFCAC4F015247D28339062BCBAA7FC75C9486CAA76A9D0D
                    SHA-512:381FD14B550674D0214D75D203264947078D874AFA91122BFAD5FB96C3A523FDDF1DCCD6C69E46C6590CA1AB9025A647E253188E7B9927F0BAAB8BB199C1D9C7
                    Malicious:true
                    Yara Hits:
                    • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Notepad.exe, Author: Joe Security
                    • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Notepad.exe, Author: Joe Security
                    • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\Notepad.exe, Author: unknown
                    • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\Notepad.exe, Author: unknown
                    • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: C:\Notepad.exe, Author: Florian Roth
                    • Rule: crimeware_njrat_strings, Description: Detects njRAT based on some strings, Source: C:\Notepad.exe, Author: Sekoia.io
                    • Rule: crimeware_njrat_strings, Description: Detects njRAT based on some strings, Source: C:\Notepad.exe, Author: Sekoia.io
                    • Rule: crimeware_njrat_strings, Description: Detects njRAT based on some strings, Source: C:\Notepad.exe, Author: Sekoia.io
                    • Rule: crimeware_njrat_strings, Description: Detects njRAT based on some strings, Source: C:\Notepad.exe, Author: Sekoia.io
                    • Rule: crimeware_njrat_strings, Description: Detects njRAT based on some strings, Source: C:\Notepad.exe, Author: Sekoia.io
                    • Rule: Njrat, Description: detect njRAT in memory, Source: C:\Notepad.exe, Author: JPCERT/CC Incident Response Group
                    • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Notepad.exe, Author: ditekSHen
                    • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Notepad.exe, Author: ditekSHen
                    • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Notepad.exe, Author: ditekSHen
                    • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Notepad.exe, Author: ditekSHen
                    • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Notepad.exe, Author: ditekSHen
                    • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Notepad.exe, Author: ditekSHen
                    • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Notepad.exe, Author: ditekSHen
                    • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Notepad.exe, Author: ditekSHen
                    • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Notepad.exe, Author: ditekSHen
                    • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Notepad.exe, Author: ditekSHen
                    • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Notepad.exe, Author: ditekSHen
                    • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Notepad.exe, Author: ditekSHen
                    • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Notepad.exe, Author: ditekSHen
                    • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Notepad.exe, Author: ditekSHen
                    • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Notepad.exe, Author: ditekSHen
                    • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Notepad.exe, Author: ditekSHen
                    • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Notepad.exe, Author: ditekSHen
                    • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Notepad.exe, Author: ditekSHen
                    • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Notepad.exe, Author: ditekSHen
                    • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Notepad.exe, Author: ditekSHen
                    • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Notepad.exe, Author: ditekSHen
                    • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Notepad.exe, Author: ditekSHen
                    • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Notepad.exe, Author: ditekSHen
                    • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Notepad.exe, Author: ditekSHen
                    • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Notepad.exe, Author: ditekSHen
                    • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Notepad.exe, Author: ditekSHen
                    • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Notepad.exe, Author: ditekSHen
                    • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Notepad.exe, Author: ditekSHen
                    • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Notepad.exe, Author: ditekSHen
                    • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Notepad.exe, Author: ditekSHen
                    • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Notepad.exe, Author: ditekSHen
                    • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Notepad.exe, Author: ditekSHen
                    • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Notepad.exe, Author: ditekSHen
                    • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Notepad.exe, Author: ditekSHen
                    • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Notepad.exe, Author: ditekSHen
                    Antivirus:
                    • Antivirus: Avira, Detection: 100%
                    • Antivirus: Joe Sandbox ML, Detection: 100%
                    • Antivirus: ReversingLabs, Detection: 96%
                    • Antivirus: Virustotal, Detection: 71%, Browse
                    Reputation:low
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......g.................p............... ........@.. ....................................@.....................................S.................................................................................... ............... ..H............text....o... ...p.................. ..`.reloc...............r..............@..B................................................................H.......................................................................&.(......**..(......*.s.........s ........s!........s".........*.0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                    Process:C:\Users\user\server.exe
                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Category:dropped
                    Size (bytes):95232
                    Entropy (8bit):5.562169391138688
                    Encrypted:false
                    SSDEEP:768:/Y34G/jglPPMJI08+EyrERm9hX+JlwA461mXxrjEtCdnl2pi1Rz4Rk3qsGdpYgS7:RG7gdQ8+f4mXpA4tjEwzGi1dDGDYgS
                    MD5:1ED0C2E213E674C8A95694C9E19361C7
                    SHA1:05446E3404B3171264FC344BF4013EB8EA2CF740
                    SHA-256:6DFE16F82116F1537EFCAC4F015247D28339062BCBAA7FC75C9486CAA76A9D0D
                    SHA-512:381FD14B550674D0214D75D203264947078D874AFA91122BFAD5FB96C3A523FDDF1DCCD6C69E46C6590CA1AB9025A647E253188E7B9927F0BAAB8BB199C1D9C7
                    Malicious:true
                    Yara Hits:
                    • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Program Files (x86)\Explower.exe, Author: Joe Security
                    • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\Program Files (x86)\Explower.exe, Author: unknown
                    • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: C:\Program Files (x86)\Explower.exe, Author: Florian Roth
                    • Rule: crimeware_njrat_strings, Description: Detects njRAT based on some strings, Source: C:\Program Files (x86)\Explower.exe, Author: Sekoia.io
                    • Rule: Njrat, Description: detect njRAT in memory, Source: C:\Program Files (x86)\Explower.exe, Author: JPCERT/CC Incident Response Group
                    • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
                    • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
                    • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Program Files (x86)\Explower.exe, Author: ditekSHen
                    Antivirus:
                    • Antivirus: Avira, Detection: 100%
                    • Antivirus: Avira, Detection: 100%
                    • Antivirus: Avira, Detection: 100%
                    • Antivirus: Avira, Detection: 100%
                    • Antivirus: Avira, Detection: 100%
                    • Antivirus: Avira, Detection: 100%
                    • Antivirus: Avira, Detection: 100%
                    • Antivirus: Avira, Detection: 100%
                    • Antivirus: Avira, Detection: 100%
                    • Antivirus: Avira, Detection: 100%
                    • Antivirus: Joe Sandbox ML, Detection: 100%
                    • Antivirus: Joe Sandbox ML, Detection: 100%
                    • Antivirus: Joe Sandbox ML, Detection: 100%
                    • Antivirus: Joe Sandbox ML, Detection: 100%
                    • Antivirus: Joe Sandbox ML, Detection: 100%
                    • Antivirus: Joe Sandbox ML, Detection: 100%
                    • Antivirus: Joe Sandbox ML, Detection: 100%
                    • Antivirus: Joe Sandbox ML, Detection: 100%
                    • Antivirus: Joe Sandbox ML, Detection: 100%
                    • Antivirus: Joe Sandbox ML, Detection: 100%
                    • Antivirus: ReversingLabs, Detection: 96%
                    • Antivirus: Virustotal, Detection: 71%, Browse
                    Reputation:low
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......g.................p............... ........@.. ....................................@.....................................S.................................................................................... ............... ..H............text....o... ...p.................. ..`.reloc...............r..............@..B................................................................H.......................................................................&.(......**..(......*.s.........s ........s!........s".........*.0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                    Process:C:\Users\user\server.exe
                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Category:dropped
                    Size (bytes):95232
                    Entropy (8bit):5.562169391138688
                    Encrypted:false
                    SSDEEP:768:/Y34G/jglPPMJI08+EyrERm9hX+JlwA461mXxrjEtCdnl2pi1Rz4Rk3qsGdpYgS7:RG7gdQ8+f4mXpA4tjEwzGi1dDGDYgS
                    MD5:1ED0C2E213E674C8A95694C9E19361C7
                    SHA1:05446E3404B3171264FC344BF4013EB8EA2CF740
                    SHA-256:6DFE16F82116F1537EFCAC4F015247D28339062BCBAA7FC75C9486CAA76A9D0D
                    SHA-512:381FD14B550674D0214D75D203264947078D874AFA91122BFAD5FB96C3A523FDDF1DCCD6C69E46C6590CA1AB9025A647E253188E7B9927F0BAAB8BB199C1D9C7
                    Malicious:true
                    Yara Hits:
                    • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Umbrella.flv.exe, Author: Joe Security
                    • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Umbrella.flv.exe, Author: Joe Security
                    • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\Umbrella.flv.exe, Author: unknown
                    • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\Umbrella.flv.exe, Author: unknown
                    • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: C:\Umbrella.flv.exe, Author: Florian Roth
                    • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: C:\Umbrella.flv.exe, Author: Florian Roth
                    • Rule: crimeware_njrat_strings, Description: Detects njRAT based on some strings, Source: C:\Umbrella.flv.exe, Author: Sekoia.io
                    • Rule: crimeware_njrat_strings, Description: Detects njRAT based on some strings, Source: C:\Umbrella.flv.exe, Author: Sekoia.io
                    • Rule: crimeware_njrat_strings, Description: Detects njRAT based on some strings, Source: C:\Umbrella.flv.exe, Author: Sekoia.io
                    • Rule: Njrat, Description: detect njRAT in memory, Source: C:\Umbrella.flv.exe, Author: JPCERT/CC Incident Response Group
                    • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Umbrella.flv.exe, Author: ditekSHen
                    Antivirus:
                    • Antivirus: Avira, Detection: 100%
                    • Antivirus: Joe Sandbox ML, Detection: 100%
                    • Antivirus: ReversingLabs, Detection: 96%
                    • Antivirus: Virustotal, Detection: 71%, Browse
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......g.................p............... ........@.. ....................................@.....................................S.................................................................................... ............... ..H............text....o... ...p.................. ..`.reloc...............r..............@..B................................................................H.......................................................................&.(......**..(......*.s.........s ........s!........s".........*.0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                    Process:C:\Users\user\server.exe
                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Category:dropped
                    Size (bytes):95232
                    Entropy (8bit):5.562169391138688
                    Encrypted:false
                    SSDEEP:768:/Y34G/jglPPMJI08+EyrERm9hX+JlwA461mXxrjEtCdnl2pi1Rz4Rk3qsGdpYgS7:RG7gdQ8+f4mXpA4tjEwzGi1dDGDYgS
                    MD5:1ED0C2E213E674C8A95694C9E19361C7
                    SHA1:05446E3404B3171264FC344BF4013EB8EA2CF740
                    SHA-256:6DFE16F82116F1537EFCAC4F015247D28339062BCBAA7FC75C9486CAA76A9D0D
                    SHA-512:381FD14B550674D0214D75D203264947078D874AFA91122BFAD5FB96C3A523FDDF1DCCD6C69E46C6590CA1AB9025A647E253188E7B9927F0BAAB8BB199C1D9C7
                    Malicious:true
                    Antivirus:
                    • Antivirus: ReversingLabs, Detection: 96%
                    • Antivirus: Virustotal, Detection: 71%, Browse
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......g.................p............... ........@.. ....................................@.....................................S.................................................................................... ............... ..H............text....o... ...p.................. ..`.reloc...............r..............@..B................................................................H.......................................................................&.(......**..(......*.s.........s ........s!........s".........*.0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                    Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):525
                    Entropy (8bit):5.259753436570609
                    Encrypted:false
                    SSDEEP:12:Q3LaJU2C9XAn10Ug+9pfu9t0U29xtUz1B0U2uk71K6xhk7v:MLF2CpI3zffup29Iz52Ve
                    MD5:260E01CC001F9C4643CA7A62F395D747
                    SHA1:492AD0ACE3A9C8736909866EEA168962D418BE5A
                    SHA-256:4BC52CCF866F489772A6919A0CC2C55B1432729D6BDF29E17E5853ABDFAB6030
                    SHA-512:01AF7D75257E3DBD460E328F5C057D0367B83D3D9397E89CA3AE54AB9B2842D62352D8CCB4BE98ACE0C5667846759D32C199DE39ECCD0CF9CD6A83267D27E7C4
                    Malicious:false
                    Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\bec14584c93014efbc76285c35d1e891\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\7d443c6c007fe8696f9aa6ff1da53ef7\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\2cdaeaf53e3d49038cf7cb0ce9d805d3\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\d0e5535854cce87ea7f2d69d0594b7a8\System.Windows.Forms.ni.dll",0..
                    Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):525
                    Entropy (8bit):5.259753436570609
                    Encrypted:false
                    SSDEEP:12:Q3LaJU2C9XAn10Ug+9pfu9t0U29xtUz1B0U2uk71K6xhk7v:MLF2CpI3zffup29Iz52Ve
                    MD5:260E01CC001F9C4643CA7A62F395D747
                    SHA1:492AD0ACE3A9C8736909866EEA168962D418BE5A
                    SHA-256:4BC52CCF866F489772A6919A0CC2C55B1432729D6BDF29E17E5853ABDFAB6030
                    SHA-512:01AF7D75257E3DBD460E328F5C057D0367B83D3D9397E89CA3AE54AB9B2842D62352D8CCB4BE98ACE0C5667846759D32C199DE39ECCD0CF9CD6A83267D27E7C4
                    Malicious:false
                    Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\bec14584c93014efbc76285c35d1e891\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\7d443c6c007fe8696f9aa6ff1da53ef7\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\2cdaeaf53e3d49038cf7cb0ce9d805d3\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\d0e5535854cce87ea7f2d69d0594b7a8\System.Windows.Forms.ni.dll",0..
                    Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):525
                    Entropy (8bit):5.259753436570609
                    Encrypted:false
                    SSDEEP:12:Q3LaJU2C9XAn10Ug+9pfu9t0U29xtUz1B0U2uk71K6xhk7v:MLF2CpI3zffup29Iz52Ve
                    MD5:260E01CC001F9C4643CA7A62F395D747
                    SHA1:492AD0ACE3A9C8736909866EEA168962D418BE5A
                    SHA-256:4BC52CCF866F489772A6919A0CC2C55B1432729D6BDF29E17E5853ABDFAB6030
                    SHA-512:01AF7D75257E3DBD460E328F5C057D0367B83D3D9397E89CA3AE54AB9B2842D62352D8CCB4BE98ACE0C5667846759D32C199DE39ECCD0CF9CD6A83267D27E7C4
                    Malicious:false
                    Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\bec14584c93014efbc76285c35d1e891\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\7d443c6c007fe8696f9aa6ff1da53ef7\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\2cdaeaf53e3d49038cf7cb0ce9d805d3\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\d0e5535854cce87ea7f2d69d0594b7a8\System.Windows.Forms.ni.dll",0..
                    Process:C:\Users\user\Desktop\Gv10VZCeN7.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):525
                    Entropy (8bit):5.259753436570609
                    Encrypted:false
                    SSDEEP:12:Q3LaJU2C9XAn10Ug+9pfu9t0U29xtUz1B0U2uk71K6xhk7v:MLF2CpI3zffup29Iz52Ve
                    MD5:260E01CC001F9C4643CA7A62F395D747
                    SHA1:492AD0ACE3A9C8736909866EEA168962D418BE5A
                    SHA-256:4BC52CCF866F489772A6919A0CC2C55B1432729D6BDF29E17E5853ABDFAB6030
                    SHA-512:01AF7D75257E3DBD460E328F5C057D0367B83D3D9397E89CA3AE54AB9B2842D62352D8CCB4BE98ACE0C5667846759D32C199DE39ECCD0CF9CD6A83267D27E7C4
                    Malicious:true
                    Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\bec14584c93014efbc76285c35d1e891\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\7d443c6c007fe8696f9aa6ff1da53ef7\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\2cdaeaf53e3d49038cf7cb0ce9d805d3\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\d0e5535854cce87ea7f2d69d0594b7a8\System.Windows.Forms.ni.dll",0..
                    Process:C:\Users\user\server.exe
                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Category:dropped
                    Size (bytes):95232
                    Entropy (8bit):5.562169391138688
                    Encrypted:false
                    SSDEEP:768:/Y34G/jglPPMJI08+EyrERm9hX+JlwA461mXxrjEtCdnl2pi1Rz4Rk3qsGdpYgS7:RG7gdQ8+f4mXpA4tjEwzGi1dDGDYgS
                    MD5:1ED0C2E213E674C8A95694C9E19361C7
                    SHA1:05446E3404B3171264FC344BF4013EB8EA2CF740
                    SHA-256:6DFE16F82116F1537EFCAC4F015247D28339062BCBAA7FC75C9486CAA76A9D0D
                    SHA-512:381FD14B550674D0214D75D203264947078D874AFA91122BFAD5FB96C3A523FDDF1DCCD6C69E46C6590CA1AB9025A647E253188E7B9927F0BAAB8BB199C1D9C7
                    Malicious:true
                    Antivirus:
                    • Antivirus: ReversingLabs, Detection: 96%
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......g.................p............... ........@.. ....................................@.....................................S.................................................................................... ............... ..H............text....o... ...p.................. ..`.reloc...............r..............@..B................................................................H.......................................................................&.(......**..(......*.s.........s ........s!........s".........*.0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                    Process:C:\Users\user\server.exe
                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Category:dropped
                    Size (bytes):95232
                    Entropy (8bit):5.562169391138688
                    Encrypted:false
                    SSDEEP:768:/Y34G/jglPPMJI08+EyrERm9hX+JlwA461mXxrjEtCdnl2pi1Rz4Rk3qsGdpYgS7:RG7gdQ8+f4mXpA4tjEwzGi1dDGDYgS
                    MD5:1ED0C2E213E674C8A95694C9E19361C7
                    SHA1:05446E3404B3171264FC344BF4013EB8EA2CF740
                    SHA-256:6DFE16F82116F1537EFCAC4F015247D28339062BCBAA7FC75C9486CAA76A9D0D
                    SHA-512:381FD14B550674D0214D75D203264947078D874AFA91122BFAD5FB96C3A523FDDF1DCCD6C69E46C6590CA1AB9025A647E253188E7B9927F0BAAB8BB199C1D9C7
                    Malicious:true
                    Antivirus:
                    • Antivirus: ReversingLabs, Detection: 96%
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......g.................p............... ........@.. ....................................@.....................................S.................................................................................... ............... ..H............text....o... ...p.................. ..`.reloc...............r..............@..B................................................................H.......................................................................&.(......**..(......*.s.........s ........s!........s".........*.0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                    Process:C:\Users\user\server.exe
                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Category:dropped
                    Size (bytes):95232
                    Entropy (8bit):5.562169391138688
                    Encrypted:false
                    SSDEEP:768:/Y34G/jglPPMJI08+EyrERm9hX+JlwA461mXxrjEtCdnl2pi1Rz4Rk3qsGdpYgS7:RG7gdQ8+f4mXpA4tjEwzGi1dDGDYgS
                    MD5:1ED0C2E213E674C8A95694C9E19361C7
                    SHA1:05446E3404B3171264FC344BF4013EB8EA2CF740
                    SHA-256:6DFE16F82116F1537EFCAC4F015247D28339062BCBAA7FC75C9486CAA76A9D0D
                    SHA-512:381FD14B550674D0214D75D203264947078D874AFA91122BFAD5FB96C3A523FDDF1DCCD6C69E46C6590CA1AB9025A647E253188E7B9927F0BAAB8BB199C1D9C7
                    Malicious:true
                    Antivirus:
                    • Antivirus: ReversingLabs, Detection: 96%
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......g.................p............... ........@.. ....................................@.....................................S.................................................................................... ............... ..H............text....o... ...p.................. ..`.reloc...............r..............@..B................................................................H.......................................................................&.(......**..(......*.s.........s ........s!........s".........*.0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                    Process:C:\Users\user\server.exe
                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Category:dropped
                    Size (bytes):95232
                    Entropy (8bit):5.562169391138688
                    Encrypted:false
                    SSDEEP:768:/Y34G/jglPPMJI08+EyrERm9hX+JlwA461mXxrjEtCdnl2pi1Rz4Rk3qsGdpYgS7:RG7gdQ8+f4mXpA4tjEwzGi1dDGDYgS
                    MD5:1ED0C2E213E674C8A95694C9E19361C7
                    SHA1:05446E3404B3171264FC344BF4013EB8EA2CF740
                    SHA-256:6DFE16F82116F1537EFCAC4F015247D28339062BCBAA7FC75C9486CAA76A9D0D
                    SHA-512:381FD14B550674D0214D75D203264947078D874AFA91122BFAD5FB96C3A523FDDF1DCCD6C69E46C6590CA1AB9025A647E253188E7B9927F0BAAB8BB199C1D9C7
                    Malicious:true
                    Yara Hits:
                    • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exe, Author: Joe Security
                    • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exe, Author: unknown
                    • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exe, Author: Florian Roth
                    • Rule: crimeware_njrat_strings, Description: Detects njRAT based on some strings, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exe, Author: Sekoia.io
                    • Rule: Njrat, Description: detect njRAT in memory, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exe, Author: JPCERT/CC Incident Response Group
                    • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exe, Author: ditekSHen
                    • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exe, Author: ditekSHen
                    • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exe, Author: ditekSHen
                    • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exe, Author: ditekSHen
                    Antivirus:
                    • Antivirus: Avira, Detection: 100%
                    • Antivirus: Joe Sandbox ML, Detection: 100%
                    • Antivirus: ReversingLabs, Detection: 96%
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......g.................p............... ........@.. ....................................@.....................................S.................................................................................... ............... ..H............text....o... ...p.................. ..`.reloc...............r..............@..B................................................................H.......................................................................&.(......**..(......*.s.........s ........s!........s".........*.0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                    Process:C:\Users\user\server.exe
                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Category:dropped
                    Size (bytes):95232
                    Entropy (8bit):5.562169391138688
                    Encrypted:false
                    SSDEEP:768:/Y34G/jglPPMJI08+EyrERm9hX+JlwA461mXxrjEtCdnl2pi1Rz4Rk3qsGdpYgS7:RG7gdQ8+f4mXpA4tjEwzGi1dDGDYgS
                    MD5:1ED0C2E213E674C8A95694C9E19361C7
                    SHA1:05446E3404B3171264FC344BF4013EB8EA2CF740
                    SHA-256:6DFE16F82116F1537EFCAC4F015247D28339062BCBAA7FC75C9486CAA76A9D0D
                    SHA-512:381FD14B550674D0214D75D203264947078D874AFA91122BFAD5FB96C3A523FDDF1DCCD6C69E46C6590CA1AB9025A647E253188E7B9927F0BAAB8BB199C1D9C7
                    Malicious:true
                    Yara Hits:
                    • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exe, Author: Joe Security
                    • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exe, Author: unknown
                    • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exe, Author: Florian Roth
                    • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exe, Author: Florian Roth
                    • Rule: crimeware_njrat_strings, Description: Detects njRAT based on some strings, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exe, Author: Sekoia.io
                    • Rule: crimeware_njrat_strings, Description: Detects njRAT based on some strings, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exe, Author: Sekoia.io
                    • Rule: Njrat, Description: detect njRAT in memory, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exe, Author: JPCERT/CC Incident Response Group
                    • Rule: Njrat, Description: detect njRAT in memory, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exe, Author: JPCERT/CC Incident Response Group
                    • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exe, Author: ditekSHen
                    Antivirus:
                    • Antivirus: Avira, Detection: 100%
                    • Antivirus: Joe Sandbox ML, Detection: 100%
                    • Antivirus: ReversingLabs, Detection: 96%
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......g.................p............... ........@.. ....................................@.....................................S.................................................................................... ............... ..H............text....o... ...p.................. ..`.reloc...............r..............@..B................................................................H.......................................................................&.(......**..(......*.s.........s ........s!........s".........*.0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                    Process:C:\Users\user\server.exe
                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Category:dropped
                    Size (bytes):95232
                    Entropy (8bit):5.562169391138688
                    Encrypted:false
                    SSDEEP:768:/Y34G/jglPPMJI08+EyrERm9hX+JlwA461mXxrjEtCdnl2pi1Rz4Rk3qsGdpYgS7:RG7gdQ8+f4mXpA4tjEwzGi1dDGDYgS
                    MD5:1ED0C2E213E674C8A95694C9E19361C7
                    SHA1:05446E3404B3171264FC344BF4013EB8EA2CF740
                    SHA-256:6DFE16F82116F1537EFCAC4F015247D28339062BCBAA7FC75C9486CAA76A9D0D
                    SHA-512:381FD14B550674D0214D75D203264947078D874AFA91122BFAD5FB96C3A523FDDF1DCCD6C69E46C6590CA1AB9025A647E253188E7B9927F0BAAB8BB199C1D9C7
                    Malicious:true
                    Antivirus:
                    • Antivirus: ReversingLabs, Detection: 96%
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......g.................p............... ........@.. ....................................@.....................................S.................................................................................... ............... ..H............text....o... ...p.................. ..`.reloc...............r..............@..B................................................................H.......................................................................&.(......**..(......*.s.........s ........s!........s".........*.0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                    Process:C:\Users\user\Desktop\Gv10VZCeN7.exe
                    File Type:Unicode text, UTF-8 (with BOM) text, with no line terminators
                    Category:dropped
                    Size (bytes):5
                    Entropy (8bit):1.9219280948873623
                    Encrypted:false
                    SSDEEP:3:yn:yn
                    MD5:24E9E7D7EEA4DE90C8FC67AE1145ABF2
                    SHA1:DD9BB46CCC6340CA892CF17EBE32B9BDBADEE2D1
                    SHA-256:BD6C1D15579254E8879ADA07376F93CB2E959F45670374892FDE2EFAF4194F6C
                    SHA-512:5572AFD61C7BA666515A987F23AD0A05AB753BDC28CFA492ADB30200207427A4A38699D3B7981E0750414775A4CE72A209511951D38A8673C709B08774FCA01F
                    Malicious:false
                    Preview:.11
                    Process:C:\Users\user\server.exe
                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Category:dropped
                    Size (bytes):95232
                    Entropy (8bit):5.562169391138688
                    Encrypted:false
                    SSDEEP:768:/Y34G/jglPPMJI08+EyrERm9hX+JlwA461mXxrjEtCdnl2pi1Rz4Rk3qsGdpYgS7:RG7gdQ8+f4mXpA4tjEwzGi1dDGDYgS
                    MD5:1ED0C2E213E674C8A95694C9E19361C7
                    SHA1:05446E3404B3171264FC344BF4013EB8EA2CF740
                    SHA-256:6DFE16F82116F1537EFCAC4F015247D28339062BCBAA7FC75C9486CAA76A9D0D
                    SHA-512:381FD14B550674D0214D75D203264947078D874AFA91122BFAD5FB96C3A523FDDF1DCCD6C69E46C6590CA1AB9025A647E253188E7B9927F0BAAB8BB199C1D9C7
                    Malicious:true
                    Antivirus:
                    • Antivirus: ReversingLabs, Detection: 96%
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......g.................p............... ........@.. ....................................@.....................................S.................................................................................... ............... ..H............text....o... ...p.................. ..`.reloc...............r..............@..B................................................................H.......................................................................&.(......**..(......*.s.........s ........s!........s".........*.0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                    Process:C:\Users\user\server.exe
                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Category:dropped
                    Size (bytes):95232
                    Entropy (8bit):5.562169391138688
                    Encrypted:false
                    SSDEEP:768:/Y34G/jglPPMJI08+EyrERm9hX+JlwA461mXxrjEtCdnl2pi1Rz4Rk3qsGdpYgS7:RG7gdQ8+f4mXpA4tjEwzGi1dDGDYgS
                    MD5:1ED0C2E213E674C8A95694C9E19361C7
                    SHA1:05446E3404B3171264FC344BF4013EB8EA2CF740
                    SHA-256:6DFE16F82116F1537EFCAC4F015247D28339062BCBAA7FC75C9486CAA76A9D0D
                    SHA-512:381FD14B550674D0214D75D203264947078D874AFA91122BFAD5FB96C3A523FDDF1DCCD6C69E46C6590CA1AB9025A647E253188E7B9927F0BAAB8BB199C1D9C7
                    Malicious:true
                    Antivirus:
                    • Antivirus: ReversingLabs, Detection: 96%
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......g.................p............... ........@.. ....................................@.....................................S.................................................................................... ............... ..H............text....o... ...p.................. ..`.reloc...............r..............@..B................................................................H.......................................................................&.(......**..(......*.s.........s ........s!........s".........*.0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                    Process:C:\Users\user\server.exe
                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Category:dropped
                    Size (bytes):95232
                    Entropy (8bit):5.562169391138688
                    Encrypted:false
                    SSDEEP:768:/Y34G/jglPPMJI08+EyrERm9hX+JlwA461mXxrjEtCdnl2pi1Rz4Rk3qsGdpYgS7:RG7gdQ8+f4mXpA4tjEwzGi1dDGDYgS
                    MD5:1ED0C2E213E674C8A95694C9E19361C7
                    SHA1:05446E3404B3171264FC344BF4013EB8EA2CF740
                    SHA-256:6DFE16F82116F1537EFCAC4F015247D28339062BCBAA7FC75C9486CAA76A9D0D
                    SHA-512:381FD14B550674D0214D75D203264947078D874AFA91122BFAD5FB96C3A523FDDF1DCCD6C69E46C6590CA1AB9025A647E253188E7B9927F0BAAB8BB199C1D9C7
                    Malicious:true
                    Antivirus:
                    • Antivirus: ReversingLabs, Detection: 96%
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......g.................p............... ........@.. ....................................@.....................................S.................................................................................... ............... ..H............text....o... ...p.................. ..`.reloc...............r..............@..B................................................................H.......................................................................&.(......**..(......*.s.........s ........s!........s".........*.0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                    Process:C:\Users\user\Desktop\Gv10VZCeN7.exe
                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Category:dropped
                    Size (bytes):95232
                    Entropy (8bit):5.562169391138688
                    Encrypted:false
                    SSDEEP:768:/Y34G/jglPPMJI08+EyrERm9hX+JlwA461mXxrjEtCdnl2pi1Rz4Rk3qsGdpYgS7:RG7gdQ8+f4mXpA4tjEwzGi1dDGDYgS
                    MD5:1ED0C2E213E674C8A95694C9E19361C7
                    SHA1:05446E3404B3171264FC344BF4013EB8EA2CF740
                    SHA-256:6DFE16F82116F1537EFCAC4F015247D28339062BCBAA7FC75C9486CAA76A9D0D
                    SHA-512:381FD14B550674D0214D75D203264947078D874AFA91122BFAD5FB96C3A523FDDF1DCCD6C69E46C6590CA1AB9025A647E253188E7B9927F0BAAB8BB199C1D9C7
                    Malicious:true
                    Yara Hits:
                    • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Users\user\server.exe, Author: Joe Security
                    • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Users\user\server.exe, Author: Joe Security
                    • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\Users\user\server.exe, Author: unknown
                    • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: C:\Users\user\server.exe, Author: Florian Roth
                    • Rule: crimeware_njrat_strings, Description: Detects njRAT based on some strings, Source: C:\Users\user\server.exe, Author: Sekoia.io
                    • Rule: Njrat, Description: detect njRAT in memory, Source: C:\Users\user\server.exe, Author: JPCERT/CC Incident Response Group
                    • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\server.exe, Author: ditekSHen
                    Antivirus:
                    • Antivirus: Avira, Detection: 100%
                    • Antivirus: Joe Sandbox ML, Detection: 100%
                    • Antivirus: ReversingLabs, Detection: 96%
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......g.................p............... ........@.. ....................................@.....................................S.................................................................................... ............... ..H............text....o... ...p.................. ..`.reloc...............r..............@..B................................................................H.......................................................................&.(......**..(......*.s.........s ........s!........s".........*.0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                    Process:C:\Users\user\server.exe
                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Category:dropped
                    Size (bytes):95232
                    Entropy (8bit):5.562169391138688
                    Encrypted:false
                    SSDEEP:768:/Y34G/jglPPMJI08+EyrERm9hX+JlwA461mXxrjEtCdnl2pi1Rz4Rk3qsGdpYgS7:RG7gdQ8+f4mXpA4tjEwzGi1dDGDYgS
                    MD5:1ED0C2E213E674C8A95694C9E19361C7
                    SHA1:05446E3404B3171264FC344BF4013EB8EA2CF740
                    SHA-256:6DFE16F82116F1537EFCAC4F015247D28339062BCBAA7FC75C9486CAA76A9D0D
                    SHA-512:381FD14B550674D0214D75D203264947078D874AFA91122BFAD5FB96C3A523FDDF1DCCD6C69E46C6590CA1AB9025A647E253188E7B9927F0BAAB8BB199C1D9C7
                    Malicious:true
                    Antivirus:
                    • Antivirus: ReversingLabs, Detection: 96%
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......g.................p............... ........@.. ....................................@.....................................S.................................................................................... ............... ..H............text....o... ...p.................. ..`.reloc...............r..............@..B................................................................H.......................................................................&.(......**..(......*.s.........s ........s!........s".........*.0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                    Process:C:\Users\user\server.exe
                    File Type:Microsoft Windows Autorun file
                    Category:dropped
                    Size (bytes):55
                    Entropy (8bit):4.474554204780528
                    Encrypted:false
                    SSDEEP:3:It1KV2PHQCyK0x:e1KAwCyD
                    MD5:40B1630BE21F39CB17BD1963CAE5A207
                    SHA1:63C14BD151D42820DD45C033363FA5B9E1D34124
                    SHA-256:F87E55F1A423B65FD639146F71F6027DBD4D6E69B65D9A17F1744774AA6589E1
                    SHA-512:833112ED4A9A3C621D2FFFC78F83502B2937B82A2CF9BC692D75D907CE2AA46C2D97CFE23C402DB3292B2DD2655FF8692C3CD00D5BA4D792C3D8AF24958E1926
                    Malicious:true
                    Preview:[autorun]..open=C:\Umbrella.flv.exe..shellexecute=C:\..
                    Process:C:\Windows\SysWOW64\netsh.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):313
                    Entropy (8bit):4.971939296804078
                    Encrypted:false
                    SSDEEP:6:/ojfKsUTGN8Ypox42k9L+DbGMKeQE+vigqAZs2E+AYeDPO+Yswyha:wjPIGNrkHk9iaeIM6ADDPOHyha
                    MD5:689E2126A85BF55121488295EE068FA1
                    SHA1:09BAAA253A49D80C18326DFBCA106551EBF22DD6
                    SHA-256:D968A966EF474068E41256321F77807A042F1965744633D37A203A705662EC25
                    SHA-512:C3736A8FC7E6573FA1B26FE6A901C05EE85C55A4A276F8F569D9EADC9A58BEC507D1BB90DBF9EA62AE79A6783178C69304187D6B90441D82E46F5F56172B5C5C
                    Malicious:false
                    Preview:..IMPORTANT: Command executed successfully...However, "netsh firewall" is deprecated;..use "netsh advfirewall firewall" instead...For more information on using "netsh advfirewall firewall" commands..instead of "netsh firewall", see KB article 947709..at https://go.microsoft.com/fwlink/?linkid=121488 .....Ok.....
                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Entropy (8bit):5.562169391138688
                    TrID:
                    • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                    • Win32 Executable (generic) a (10002005/4) 49.75%
                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                    • Windows Screen Saver (13104/52) 0.07%
                    • Generic Win/DOS Executable (2004/3) 0.01%
                    File name:Gv10VZCeN7.exe
                    File size:95'232 bytes
                    MD5:1ed0c2e213e674c8a95694c9e19361c7
                    SHA1:05446e3404b3171264fc344bf4013eb8ea2cf740
                    SHA256:6dfe16f82116f1537efcac4f015247d28339062bcbaa7fc75c9486caa76a9d0d
                    SHA512:381fd14b550674d0214d75d203264947078d874afa91122bfad5fb96c3a523fddf1dccd6c69e46c6590ca1ab9025a647e253188e7b9927f0baab8bb199c1d9c7
                    SSDEEP:768:/Y34G/jglPPMJI08+EyrERm9hX+JlwA461mXxrjEtCdnl2pi1Rz4Rk3qsGdpYgS7:RG7gdQ8+f4mXpA4tjEwzGi1dDGDYgS
                    TLSH:6E93D74977E53524E0BF56F79871F2004E34B48B1642E39D59F219AA0A33AC44F89FEB
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......g.................p............... ........@.. ....................................@................................
                    Icon Hash:00928e8e8686b000
                    Entrypoint:0x418f0e
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Time Stamp:0x677F008F [Wed Jan 8 22:47:43 2025 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:4
                    OS Version Minor:0
                    File Version Major:4
                    File Version Minor:0
                    Subsystem Version Major:4
                    Subsystem Version Minor:0
                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                    Instruction
                    jmp dword ptr [00402000h]
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x18eb80x53.text
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x1a0000xc.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x20000x16f140x17000f17c069cea94517b5c4994ec1a696fbcFalse0.367919921875data5.593952565869325IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .reloc0x1a0000xc0x20026def8a0407cc7078ce41b7ef703298eFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    DLLImport
                    mscoree.dll_CorExeMain
                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                    2025-01-12T04:22:10.317562+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.549704178.215.236.2274411TCP
                    2025-01-12T04:22:10.317562+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.549704178.215.236.2274411TCP
                    2025-01-12T04:22:12.511500+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.549705178.215.236.2274411TCP
                    2025-01-12T04:22:12.511500+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.549705178.215.236.2274411TCP
                    2025-01-12T04:22:15.072271+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.549706178.215.236.2274411TCP
                    2025-01-12T04:22:15.072271+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.549706178.215.236.2274411TCP
                    2025-01-12T04:22:17.754342+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.549707178.215.236.2274411TCP
                    2025-01-12T04:22:17.754342+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.549707178.215.236.2274411TCP
                    2025-01-12T04:22:20.231848+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.549709178.215.236.2274411TCP
                    2025-01-12T04:22:20.231848+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.549709178.215.236.2274411TCP
                    2025-01-12T04:22:22.826585+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.549718178.215.236.2274411TCP
                    2025-01-12T04:22:22.826585+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.549718178.215.236.2274411TCP
                    2025-01-12T04:22:25.506261+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.549735178.215.236.2274411TCP
                    2025-01-12T04:22:25.506261+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.549735178.215.236.2274411TCP
                    2025-01-12T04:22:28.059981+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.549748178.215.236.2274411TCP
                    2025-01-12T04:22:28.059981+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.549748178.215.236.2274411TCP
                    2025-01-12T04:22:30.603246+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.549762178.215.236.2274411TCP
                    2025-01-12T04:22:30.603246+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.549762178.215.236.2274411TCP
                    2025-01-12T04:22:33.234000+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.549777178.215.236.2274411TCP
                    2025-01-12T04:22:33.234000+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.549777178.215.236.2274411TCP
                    2025-01-12T04:22:36.251465+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.549788178.215.236.2274411TCP
                    2025-01-12T04:22:36.251465+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.549788178.215.236.2274411TCP
                    2025-01-12T04:22:38.738651+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.549803178.215.236.2274411TCP
                    2025-01-12T04:22:38.738651+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.549803178.215.236.2274411TCP
                    2025-01-12T04:22:41.166350+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.549819178.215.236.2274411TCP
                    2025-01-12T04:22:41.166350+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.549819178.215.236.2274411TCP
                    2025-01-12T04:22:44.124554+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.549833178.215.236.2274411TCP
                    2025-01-12T04:22:44.124554+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.549833178.215.236.2274411TCP
                    2025-01-12T04:22:44.336896+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.549833178.215.236.2274411TCP
                    2025-01-12T04:22:46.687172+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.549849178.215.236.2274411TCP
                    2025-01-12T04:22:46.687172+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.549849178.215.236.2274411TCP
                    2025-01-12T04:22:49.359495+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.549865178.215.236.2274411TCP
                    2025-01-12T04:22:49.359495+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.549865178.215.236.2274411TCP
                    2025-01-12T04:22:51.988044+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.549881178.215.236.2274411TCP
                    2025-01-12T04:22:51.988044+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.549881178.215.236.2274411TCP
                    2025-01-12T04:22:54.490093+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.549897178.215.236.2274411TCP
                    2025-01-12T04:22:54.490093+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.549897178.215.236.2274411TCP
                    2025-01-12T04:22:57.104085+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.549910178.215.236.2274411TCP
                    2025-01-12T04:22:57.104085+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.549910178.215.236.2274411TCP
                    2025-01-12T04:22:59.603584+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.549928178.215.236.2274411TCP
                    2025-01-12T04:22:59.603584+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.549928178.215.236.2274411TCP
                    2025-01-12T04:23:02.417591+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.549943178.215.236.2274411TCP
                    2025-01-12T04:23:02.417591+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.549943178.215.236.2274411TCP
                    2025-01-12T04:23:02.554734+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.549943178.215.236.2274411TCP
                    2025-01-12T04:23:04.962457+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.549962178.215.236.2274411TCP
                    2025-01-12T04:23:04.962457+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.549962178.215.236.2274411TCP
                    2025-01-12T04:23:07.510300+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.549978178.215.236.2274411TCP
                    2025-01-12T04:23:07.510300+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.549978178.215.236.2274411TCP
                    2025-01-12T04:23:10.072428+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.549991178.215.236.2274411TCP
                    2025-01-12T04:23:10.072428+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.549991178.215.236.2274411TCP
                    2025-01-12T04:23:12.635465+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.549998178.215.236.2274411TCP
                    2025-01-12T04:23:12.635465+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.549998178.215.236.2274411TCP
                    2025-01-12T04:23:15.205821+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.549999178.215.236.2274411TCP
                    2025-01-12T04:23:15.205821+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.549999178.215.236.2274411TCP
                    2025-01-12T04:23:18.154861+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.550000178.215.236.2274411TCP
                    2025-01-12T04:23:18.154861+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.550000178.215.236.2274411TCP
                    2025-01-12T04:23:20.340859+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.550001178.215.236.2274411TCP
                    2025-01-12T04:23:20.340859+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.550001178.215.236.2274411TCP
                    2025-01-12T04:23:22.919125+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.550002178.215.236.2274411TCP
                    2025-01-12T04:23:22.919125+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.550002178.215.236.2274411TCP
                    2025-01-12T04:23:25.484397+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.550003178.215.236.2274411TCP
                    2025-01-12T04:23:25.484397+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.550003178.215.236.2274411TCP
                    2025-01-12T04:23:28.041838+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.550004178.215.236.2274411TCP
                    2025-01-12T04:23:28.041838+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.550004178.215.236.2274411TCP
                    2025-01-12T04:23:31.278781+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.550005178.215.236.2274411TCP
                    2025-01-12T04:23:31.278781+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.550005178.215.236.2274411TCP
                    2025-01-12T04:23:33.978208+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.550006178.215.236.2274411TCP
                    2025-01-12T04:23:33.978208+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.550006178.215.236.2274411TCP
                    2025-01-12T04:23:36.543124+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.550007178.215.236.2274411TCP
                    2025-01-12T04:23:36.543124+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.550007178.215.236.2274411TCP
                    2025-01-12T04:23:39.101567+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.550008178.215.236.2274411TCP
                    2025-01-12T04:23:39.101567+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.550008178.215.236.2274411TCP
                    2025-01-12T04:23:41.689312+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.550009178.215.236.2274411TCP
                    2025-01-12T04:23:41.689312+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.550009178.215.236.2274411TCP
                    2025-01-12T04:23:44.251176+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.550010178.215.236.2274411TCP
                    2025-01-12T04:23:44.251176+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.550010178.215.236.2274411TCP
                    2025-01-12T04:23:46.812129+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.550011178.215.236.2274411TCP
                    2025-01-12T04:23:46.812129+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.550011178.215.236.2274411TCP
                    2025-01-12T04:23:53.779714+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.550012178.215.236.2274411TCP
                    2025-01-12T04:23:53.779714+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.550012178.215.236.2274411TCP
                    2025-01-12T04:23:57.470603+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.550013178.215.236.2274411TCP
                    2025-01-12T04:23:57.470603+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.550013178.215.236.2274411TCP
                    2025-01-12T04:23:59.969035+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.550014178.215.236.2274411TCP
                    2025-01-12T04:23:59.969035+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.550014178.215.236.2274411TCP
                    2025-01-12T04:24:04.229677+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.550015178.215.236.2274411TCP
                    2025-01-12T04:24:04.229677+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.550015178.215.236.2274411TCP
                    2025-01-12T04:24:07.185304+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.550016178.215.236.2274411TCP
                    2025-01-12T04:24:07.185304+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.550016178.215.236.2274411TCP
                    2025-01-12T04:24:09.747641+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.550017178.215.236.2274411TCP
                    2025-01-12T04:24:09.747641+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.550017178.215.236.2274411TCP
                    2025-01-12T04:24:12.332065+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.550018178.215.236.2274411TCP
                    2025-01-12T04:24:12.332065+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.550018178.215.236.2274411TCP
                    2025-01-12T04:24:14.897831+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.550019178.215.236.2274411TCP
                    2025-01-12T04:24:14.897831+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.550019178.215.236.2274411TCP
                    2025-01-12T04:24:17.453736+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.550020178.215.236.2274411TCP
                    2025-01-12T04:24:17.453736+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.550020178.215.236.2274411TCP
                    2025-01-12T04:24:33.213631+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.550021178.215.236.2274411TCP
                    2025-01-12T04:24:33.213631+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.550021178.215.236.2274411TCP
                    2025-01-12T04:24:36.525406+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.550022178.215.236.2274411TCP
                    2025-01-12T04:24:36.525406+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.550022178.215.236.2274411TCP
                    2025-01-12T04:24:36.625895+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.550022178.215.236.2274411TCP
                    2025-01-12T04:24:39.348273+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.550023178.215.236.2274411TCP
                    2025-01-12T04:24:39.348273+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.550023178.215.236.2274411TCP
                    2025-01-12T04:24:42.096740+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.550024178.215.236.2274411TCP
                    2025-01-12T04:24:42.096740+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.550024178.215.236.2274411TCP
                    2025-01-12T04:24:44.649120+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.550025178.215.236.2274411TCP
                    2025-01-12T04:24:44.649120+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.550025178.215.236.2274411TCP
                    2025-01-12T04:24:49.227274+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.550026178.215.236.2274411TCP
                    2025-01-12T04:24:49.227274+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.550026178.215.236.2274411TCP
                    2025-01-12T04:24:51.818623+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.550027178.215.236.2274411TCP
                    2025-01-12T04:24:51.818623+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.550027178.215.236.2274411TCP
                    2025-01-12T04:24:54.526103+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.550028178.215.236.2274411TCP
                    2025-01-12T04:24:54.526103+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.550028178.215.236.2274411TCP
                    2025-01-12T04:24:57.084418+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.550029178.215.236.2274411TCP
                    2025-01-12T04:24:57.084418+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.550029178.215.236.2274411TCP
                    2025-01-12T04:24:59.727935+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.550030178.215.236.2274411TCP
                    2025-01-12T04:24:59.727935+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.550030178.215.236.2274411TCP
                    2025-01-12T04:25:02.294495+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.550031178.215.236.2274411TCP
                    2025-01-12T04:25:02.294495+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.550031178.215.236.2274411TCP
                    2025-01-12T04:25:04.838352+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.550032178.215.236.2274411TCP
                    2025-01-12T04:25:04.838352+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.550032178.215.236.2274411TCP
                    2025-01-12T04:25:07.566773+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.550033178.215.236.2274411TCP
                    2025-01-12T04:25:07.566773+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.550033178.215.236.2274411TCP
                    2025-01-12T04:25:10.058312+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.550034178.215.236.2274411TCP
                    2025-01-12T04:25:10.058312+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.550034178.215.236.2274411TCP
                    2025-01-12T04:25:12.650832+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.550035178.215.236.2274411TCP
                    2025-01-12T04:25:12.650832+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.550035178.215.236.2274411TCP
                    2025-01-12T04:25:17.174700+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.550036178.215.236.2274411TCP
                    2025-01-12T04:25:17.174700+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.550036178.215.236.2274411TCP
                    2025-01-12T04:25:21.035332+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.550037178.215.236.2274411TCP
                    2025-01-12T04:25:21.035332+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.550037178.215.236.2274411TCP
                    2025-01-12T04:25:23.089087+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.550038178.215.236.2274411TCP
                    2025-01-12T04:25:23.089087+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.550038178.215.236.2274411TCP
                    2025-01-12T04:25:25.667622+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.550039178.215.236.2274411TCP
                    2025-01-12T04:25:25.667622+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.550039178.215.236.2274411TCP
                    2025-01-12T04:25:28.200676+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.550040178.215.236.2274411TCP
                    2025-01-12T04:25:28.200676+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.550040178.215.236.2274411TCP
                    2025-01-12T04:25:30.746919+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.550041178.215.236.2274411TCP
                    2025-01-12T04:25:30.746919+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.550041178.215.236.2274411TCP
                    2025-01-12T04:25:33.299500+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.550042178.215.236.2274411TCP
                    2025-01-12T04:25:33.299500+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.550042178.215.236.2274411TCP
                    2025-01-12T04:25:35.854273+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.550043178.215.236.2274411TCP
                    2025-01-12T04:25:35.854273+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.550043178.215.236.2274411TCP
                    2025-01-12T04:25:38.549790+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.550044178.215.236.2274411TCP
                    2025-01-12T04:25:38.549790+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.550044178.215.236.2274411TCP
                    2025-01-12T04:25:41.103550+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.550045178.215.236.2274411TCP
                    2025-01-12T04:25:41.103550+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.550045178.215.236.2274411TCP
                    2025-01-12T04:25:44.495051+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.550046178.215.236.2274411TCP
                    2025-01-12T04:25:44.495051+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.550046178.215.236.2274411TCP
                    2025-01-12T04:25:46.839517+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.550047178.215.236.2274411TCP
                    2025-01-12T04:25:46.839517+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.550047178.215.236.2274411TCP
                    2025-01-12T04:25:49.475532+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.550048178.215.236.2274411TCP
                    2025-01-12T04:25:49.475532+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.550048178.215.236.2274411TCP
                    2025-01-12T04:25:52.010916+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.550049178.215.236.2274411TCP
                    2025-01-12T04:25:52.010916+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.550049178.215.236.2274411TCP
                    2025-01-12T04:25:54.560745+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.550050178.215.236.2274411TCP
                    2025-01-12T04:25:54.560745+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.550050178.215.236.2274411TCP
                    2025-01-12T04:25:57.426206+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.550051178.215.236.2274411TCP
                    2025-01-12T04:25:57.426206+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.550051178.215.236.2274411TCP
                    2025-01-12T04:26:03.371823+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.550052178.215.236.2274411TCP
                    2025-01-12T04:26:03.371823+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.550052178.215.236.2274411TCP
                    TimestampSource PortDest PortSource IPDest IP
                    Jan 12, 2025 04:22:09.215831041 CET497044411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:09.220699072 CET441149704178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:09.220782042 CET497044411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:10.317562103 CET497044411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:10.322446108 CET441149704178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:10.322499990 CET497044411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:10.327349901 CET441149704178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:10.498131990 CET441149704178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:10.498219967 CET497044411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:12.505119085 CET497044411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:12.505661964 CET497054411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:12.510060072 CET441149704178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:12.510546923 CET441149705178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:12.510616064 CET497054411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:12.511499882 CET497054411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:12.516314983 CET441149705178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:12.516390085 CET497054411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:12.521223068 CET441149705178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:13.058293104 CET441149705178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:13.058362961 CET497054411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:15.066328049 CET497054411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:15.066636086 CET497064411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:15.071276903 CET441149705178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:15.071619987 CET441149706178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:15.071690083 CET497064411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:15.072271109 CET497064411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:15.077066898 CET441149706178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:15.077172995 CET497064411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:15.082099915 CET441149706178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:15.644804955 CET441149706178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:15.645006895 CET497064411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:17.660115004 CET497064411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:17.660501957 CET497074411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:17.665139914 CET441149706178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:17.665467978 CET441149707178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:17.665544987 CET497074411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:17.754342079 CET497074411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:17.759270906 CET441149707178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:17.759362936 CET497074411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:17.764223099 CET441149707178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:18.207875967 CET441149707178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:18.207976103 CET497074411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:20.225836039 CET497074411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:20.226207972 CET497094411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:20.230838060 CET441149707178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:20.231093884 CET441149709178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:20.231168032 CET497094411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:20.231848001 CET497094411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:20.237976074 CET441149709178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:20.238032103 CET497094411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:20.244299889 CET441149709178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:20.797812939 CET441149709178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:20.797894001 CET497094411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:22.802544117 CET497094411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:22.807061911 CET497184411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:22.807437897 CET441149709178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:22.811961889 CET441149718178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:22.814246893 CET497184411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:22.826585054 CET497184411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:22.831479073 CET441149718178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:22.831576109 CET497184411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:22.836410999 CET441149718178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:23.347913980 CET441149718178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:23.348191977 CET497184411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:25.364461899 CET497184411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:25.462040901 CET497354411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:25.505347013 CET441149718178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:25.505384922 CET441149735178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:25.505506992 CET497354411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:25.506261110 CET497354411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:25.511121035 CET441149735178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:25.511190891 CET497354411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:25.516067028 CET441149735178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:26.040642023 CET441149735178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:26.040976048 CET497354411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:28.054176092 CET497354411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:28.054460049 CET497484411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:28.059274912 CET441149735178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:28.059387922 CET441149748178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:28.059473038 CET497484411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:28.059981108 CET497484411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:28.064980984 CET441149748178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:28.065059900 CET497484411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:28.069948912 CET441149748178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:28.592772007 CET441149748178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:28.592914104 CET497484411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:30.597666979 CET497484411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:30.597815037 CET497624411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:30.602622986 CET441149748178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:30.602762938 CET441149762178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:30.602835894 CET497624411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:30.603245974 CET497624411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:30.608180046 CET441149762178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:30.608238935 CET497624411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:30.613111019 CET441149762178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:31.182575941 CET441149762178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:31.182665110 CET497624411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:33.227807045 CET497624411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:33.228209019 CET497774411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:33.232760906 CET441149762178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:33.233186960 CET441149777178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:33.233256102 CET497774411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:33.233999968 CET497774411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:33.238907099 CET441149777178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:33.238981962 CET497774411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:33.243872881 CET441149777178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:33.766398907 CET441149777178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:33.766532898 CET497774411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:35.770684004 CET497774411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:35.776849985 CET441149777178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:35.879654884 CET497884411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:35.884785891 CET441149788178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:35.888272047 CET497884411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:36.251465082 CET497884411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:36.257498026 CET441149788178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:36.257591963 CET497884411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:36.263216972 CET441149788178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:36.425365925 CET441149788178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:36.425427914 CET497884411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:38.427937031 CET497884411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:38.432966948 CET441149788178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:38.473041058 CET498034411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:38.477916002 CET441149803178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:38.478049994 CET498034411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:38.738651037 CET498034411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:38.743694067 CET441149803178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:38.744613886 CET498034411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:38.749567032 CET441149803178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:39.014867067 CET441149803178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:39.015157938 CET498034411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:41.064457893 CET498034411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:41.156157970 CET441149803178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:41.160567999 CET498194411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:41.165467024 CET441149819178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:41.165554047 CET498194411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:41.166349888 CET498194411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:41.171457052 CET441149819178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:41.171560049 CET498194411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:41.176552057 CET441149819178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:41.717380047 CET441149819178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:41.720079899 CET498194411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:44.117413044 CET498194411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:44.117649078 CET498334411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:44.123944998 CET441149819178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:44.123965025 CET441149833178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:44.124059916 CET498334411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:44.124553919 CET498334411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:44.130636930 CET441149833178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:44.131083965 CET498334411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:44.137294054 CET441149833178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:44.336895943 CET498334411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:44.341799021 CET441149833178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:44.671927929 CET441149833178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:44.672054052 CET498334411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:46.679642916 CET498334411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:46.680176020 CET498494411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:46.685581923 CET441149833178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:46.686254978 CET441149849178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:46.686328888 CET498494411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:46.687171936 CET498494411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:46.693038940 CET441149849178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:46.693118095 CET498494411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:46.699062109 CET441149849178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:47.219727993 CET441149849178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:47.219832897 CET498494411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:49.353457928 CET498494411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:49.354029894 CET498654411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:49.358319044 CET441149849178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:49.358969927 CET441149865178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:49.359040022 CET498654411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:49.359494925 CET498654411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:49.364316940 CET441149865178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:49.364367008 CET498654411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:49.369169950 CET441149865178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:49.885266066 CET441149865178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:49.887495995 CET498654411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:51.894584894 CET498654411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:51.894840002 CET498814411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:51.899470091 CET441149865178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:51.899704933 CET441149881178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:51.899782896 CET498814411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:51.988044024 CET498814411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:51.992940903 CET441149881178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:51.993035078 CET498814411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:51.998226881 CET441149881178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:52.426860094 CET441149881178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:52.426939964 CET498814411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:54.444365025 CET498814411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:54.449522018 CET441149881178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:54.484415054 CET498974411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:54.489588022 CET441149897178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:54.489665985 CET498974411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:54.490092993 CET498974411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:54.495007992 CET441149897178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:54.495074034 CET498974411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:54.499965906 CET441149897178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:55.023658991 CET441149897178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:55.023811102 CET498974411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:57.035195112 CET498974411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:57.035362959 CET499104411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:57.040139914 CET441149897178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:57.040354013 CET441149910178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:57.040442944 CET499104411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:57.104084969 CET499104411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:57.108998060 CET441149910178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:57.109189034 CET499104411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:57.114094973 CET441149910178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:57.581939936 CET441149910178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:57.582075119 CET499104411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:59.597599030 CET499104411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:59.597915888 CET499284411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:59.602461100 CET441149910178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:59.602812052 CET441149928178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:59.602876902 CET499284411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:59.603584051 CET499284411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:59.608387947 CET441149928178.215.236.227192.168.2.5
                    Jan 12, 2025 04:22:59.608444929 CET499284411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:22:59.613306046 CET441149928178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:00.135992050 CET441149928178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:00.136073112 CET499284411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:02.145411968 CET499284411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:02.150507927 CET441149928178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:02.411813974 CET499434411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:02.417097092 CET441149943178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:02.417196989 CET499434411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:02.417591095 CET499434411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:02.422642946 CET441149943178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:02.422724962 CET499434411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:02.427717924 CET441149943178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:02.554733992 CET499434411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:02.562235117 CET441149943178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:02.950494051 CET441149943178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:02.950589895 CET499434411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:04.956983089 CET499434411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:04.957237959 CET499624411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:04.961859941 CET441149943178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:04.962008953 CET441149962178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:04.962064981 CET499624411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:04.962456942 CET499624411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:04.967262983 CET441149962178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:04.967324972 CET499624411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:04.972115993 CET441149962178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:05.503338099 CET441149962178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:05.503405094 CET499624411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:07.503793955 CET499624411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:07.504128933 CET499784411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:07.509397984 CET441149962178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:07.509733915 CET441149978178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:07.509804010 CET499784411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:07.510299921 CET499784411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:07.515338898 CET441149978178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:07.515388012 CET499784411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:07.520958900 CET441149978178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:08.063499928 CET441149978178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:08.063580990 CET499784411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:10.066348076 CET499784411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:10.066715956 CET499914411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:10.071188927 CET441149978178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:10.071614981 CET441149991178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:10.071680069 CET499914411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:10.072427988 CET499914411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:10.077220917 CET441149991178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:10.077279091 CET499914411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:10.082206964 CET441149991178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:10.620455980 CET441149991178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:10.620863914 CET499914411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:12.628798008 CET499914411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:12.629095078 CET499984411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:12.634834051 CET441149991178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:12.634872913 CET441149998178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:12.634960890 CET499984411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:12.635464907 CET499984411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:12.640360117 CET441149998178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:12.644273043 CET499984411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:12.649152994 CET441149998178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:13.186903954 CET441149998178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:13.186976910 CET499984411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:15.198056936 CET499984411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:15.198481083 CET499994411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:15.203100920 CET441149998178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:15.203382015 CET441149999178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:15.203459024 CET499994411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:15.205821037 CET499994411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:15.210685968 CET441149999178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:15.210752010 CET499994411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:15.215686083 CET441149999178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:15.755958080 CET441149999178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:15.756046057 CET499994411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:17.775696993 CET499994411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:17.776067019 CET500004411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:17.780702114 CET441149999178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:17.781023979 CET441150000178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:17.781106949 CET500004411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:18.154860973 CET500004411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:18.159966946 CET441150000178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:18.160043955 CET500004411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:18.164984941 CET441150000178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:18.315838099 CET441150000178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:18.315920115 CET500004411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:20.334608078 CET500004411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:20.335134029 CET500014411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:20.339641094 CET441150000178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:20.339951038 CET441150001178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:20.340014935 CET500014411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:20.340858936 CET500014411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:20.345787048 CET441150001178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:20.345875025 CET500014411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:20.350780964 CET441150001178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:20.879611015 CET441150001178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:20.879722118 CET500014411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:22.913203955 CET500014411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:22.913559914 CET500024411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:22.918232918 CET441150001178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:22.918525934 CET441150002178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:22.918654919 CET500024411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:22.919125080 CET500024411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:22.923995018 CET441150002178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:23.019480944 CET500024411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:23.024600029 CET441150002178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:23.467830896 CET441150002178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:23.467978954 CET500024411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:25.478514910 CET500024411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:25.478878021 CET500034411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:25.483572006 CET441150002178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:25.483834028 CET441150003178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:25.483911991 CET500034411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:25.484396935 CET500034411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:25.489316940 CET441150003178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:25.489382029 CET500034411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:25.494304895 CET441150003178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:26.021096945 CET441150003178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:26.021200895 CET500034411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:28.035700083 CET500034411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:28.036062956 CET500044411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:28.040709019 CET441150003178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:28.040996075 CET441150004178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:28.041069984 CET500044411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:28.041837931 CET500044411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:28.046688080 CET441150004178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:28.046749115 CET500044411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:28.051492929 CET441150004178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:28.574444056 CET441150004178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:28.574562073 CET500044411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:30.584554911 CET500044411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:30.589700937 CET441150004178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:31.272125959 CET500054411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:31.277127028 CET441150005178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:31.277220011 CET500054411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:31.278780937 CET500054411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:31.284322977 CET441150005178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:31.284377098 CET500054411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:31.289366961 CET441150005178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:31.826562881 CET441150005178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:31.826739073 CET500054411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:33.838089943 CET500054411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:33.843014002 CET441150005178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:33.972162962 CET500064411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:33.977535963 CET441150006178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:33.977624893 CET500064411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:33.978208065 CET500064411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:33.983087063 CET441150006178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:33.983155012 CET500064411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:33.988007069 CET441150006178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:34.519449949 CET441150006178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:34.519557953 CET500064411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:36.537184954 CET500064411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:36.537524939 CET500074411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:36.542450905 CET441150006178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:36.542545080 CET441150007178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:36.542622089 CET500074411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:36.543123960 CET500074411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:36.548324108 CET441150007178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:36.548398972 CET500074411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:36.553597927 CET441150007178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:37.070385933 CET441150007178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:37.070461035 CET500074411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:39.095252991 CET500074411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:39.095634937 CET500084411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:39.100296974 CET441150007178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:39.100625992 CET441150008178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:39.100707054 CET500084411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:39.101567030 CET500084411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:39.106460094 CET441150008178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:39.106528997 CET500084411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:39.111418962 CET441150008178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:39.650182962 CET441150008178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:39.650376081 CET500084411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:41.683509111 CET500084411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:41.683799982 CET500094411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:41.688528061 CET441150008178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:41.688747883 CET441150009178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:41.688834906 CET500094411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:41.689311981 CET500094411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:41.694169998 CET441150009178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:41.694243908 CET500094411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:41.699099064 CET441150009178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:42.222345114 CET441150009178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:42.222579956 CET500094411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:44.245285988 CET500094411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:44.245544910 CET500104411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:44.250345945 CET441150009178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:44.250521898 CET441150010178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:44.250600100 CET500104411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:44.251176119 CET500104411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:44.255970001 CET441150010178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:44.256040096 CET500104411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:44.260853052 CET441150010178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:44.799031973 CET441150010178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:44.799108982 CET500104411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:46.806056976 CET500104411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:46.806615114 CET500114411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:46.811084986 CET441150010178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:46.811520100 CET441150011178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:46.811592102 CET500114411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:46.812129021 CET500114411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:46.817004919 CET441150011178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:46.817066908 CET500114411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:46.821947098 CET441150011178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:47.345586061 CET441150011178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:47.345762014 CET500114411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:49.356126070 CET500114411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:49.361345053 CET441150011178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:53.773547888 CET500124411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:53.778708935 CET441150012178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:53.778785944 CET500124411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:53.779714108 CET500124411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:53.784545898 CET441150012178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:53.784595966 CET500124411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:53.789505959 CET441150012178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:54.327991962 CET441150012178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:54.328062057 CET500124411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:56.340042114 CET500124411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:56.345145941 CET441150012178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:57.407191038 CET500134411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:57.413228989 CET441150013178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:57.413392067 CET500134411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:57.470602989 CET500134411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:57.475610971 CET441150013178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:57.475708008 CET500134411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:57.480717897 CET441150013178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:57.949861050 CET441150013178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:57.949954033 CET500134411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:59.963233948 CET500134411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:59.963514090 CET500144411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:59.968504906 CET441150013178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:59.968573093 CET441150014178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:59.968627930 CET500144411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:59.969034910 CET500144411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:59.973907948 CET441150014178.215.236.227192.168.2.5
                    Jan 12, 2025 04:23:59.974001884 CET500144411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:23:59.978924036 CET441150014178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:00.518728018 CET441150014178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:00.518821955 CET500144411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:02.537487984 CET500144411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:02.542651892 CET441150014178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:02.547987938 CET500154411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:02.552923918 CET441150015178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:02.552987099 CET500154411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:03.103809118 CET441150015178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:03.103969097 CET500154411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:04.229676962 CET500154411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:04.234687090 CET441150015178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:07.179852009 CET500164411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:07.184756041 CET441150016178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:07.184828997 CET500164411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:07.185303926 CET500164411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:07.190108061 CET441150016178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:07.190166950 CET500164411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:07.194924116 CET441150016178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:07.728842020 CET441150016178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:07.728920937 CET500164411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:09.741767883 CET500164411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:09.742013931 CET500174411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:09.746784925 CET441150016178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:09.746997118 CET441150017178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:09.747082949 CET500174411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:09.747641087 CET500174411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:09.752494097 CET441150017178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:09.752578974 CET500174411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:09.757487059 CET441150017178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:10.296240091 CET441150017178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:10.296341896 CET500174411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:12.325805902 CET500174411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:12.326209068 CET500184411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:12.330883026 CET441150017178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:12.331235886 CET441150018178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:12.331315041 CET500184411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:12.332065105 CET500184411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:12.336930037 CET441150018178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:12.337037086 CET500184411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:12.341974020 CET441150018178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:12.870764971 CET441150018178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:12.870955944 CET500184411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:14.892122984 CET500184411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:14.892400980 CET500194411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:14.897042036 CET441150018178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:14.897305012 CET441150019178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:14.897417068 CET500194411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:14.897830963 CET500194411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:14.902599096 CET441150019178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:14.902652979 CET500194411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:14.907507896 CET441150019178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:15.425458908 CET441150019178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:15.425703049 CET500194411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:17.443126917 CET500194411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:17.443492889 CET500204411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:17.448286057 CET441150019178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:17.448440075 CET441150020178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:17.448512077 CET500204411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:17.453736067 CET500204411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:17.458673954 CET441150020178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:17.458738089 CET500204411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:17.463556051 CET441150020178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:17.983931065 CET441150020178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:17.984051943 CET500204411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:20.161073923 CET500204411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:20.166212082 CET441150020178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:21.278227091 CET500214411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:21.283453941 CET441150021178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:21.283550978 CET500214411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:21.817439079 CET441150021178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:21.819390059 CET500214411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:33.213630915 CET500214411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:33.218842030 CET441150021178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:36.515795946 CET500224411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:36.520992994 CET441150022178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:36.524439096 CET500224411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:36.525405884 CET500224411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:36.530334949 CET441150022178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:36.530435085 CET500224411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:36.535383940 CET441150022178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:36.625895023 CET500224411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:36.630898952 CET441150022178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:37.061184883 CET441150022178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:37.061563969 CET500224411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:39.342302084 CET500224411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:39.342677116 CET500234411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:39.347451925 CET441150022178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:39.347526073 CET441150023178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:39.347624063 CET500234411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:39.348273039 CET500234411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:39.353142977 CET441150023178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:39.353223085 CET500234411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:39.358114958 CET441150023178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:39.897001028 CET441150023178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:39.897135019 CET500234411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:42.053493977 CET500234411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:42.058543921 CET441150023178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:42.089004040 CET500244411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:42.093976021 CET441150024178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:42.094074011 CET500244411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:42.096740007 CET500244411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:42.101583958 CET441150024178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:42.101660967 CET500244411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:42.106569052 CET441150024178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:42.627487898 CET441150024178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:42.627698898 CET500244411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:44.642911911 CET500244411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:44.643346071 CET500254411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:44.647926092 CET441150024178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:44.648341894 CET441150025178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:44.648464918 CET500254411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:44.649120092 CET500254411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:44.654006958 CET441150025178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:44.654093027 CET500254411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:44.658967972 CET441150025178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:45.202896118 CET441150025178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:45.203157902 CET500254411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:47.329186916 CET500254411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:47.334279060 CET441150025178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:49.220987082 CET500264411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:49.226278067 CET441150026178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:49.226409912 CET500264411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:49.227273941 CET500264411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:49.232153893 CET441150026178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:49.232259989 CET500264411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:49.237138987 CET441150026178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:49.772228956 CET441150026178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:49.772393942 CET500264411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:51.785119057 CET500264411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:51.785450935 CET500274411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:51.817737103 CET441150026178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:51.817785025 CET441150027178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:51.817862034 CET500274411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:51.818623066 CET500274411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:51.823522091 CET441150027178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:51.823637009 CET500274411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:51.828599930 CET441150027178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:52.376275063 CET441150027178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:52.376385927 CET500274411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:54.484756947 CET500274411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:54.485035896 CET500284411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:54.490107059 CET441150027178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:54.490149021 CET441150028178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:54.490209103 CET500284411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:54.526103020 CET500284411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:54.531210899 CET441150028178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:54.531267881 CET500284411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:54.536264896 CET441150028178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:55.037904978 CET441150028178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:55.038012981 CET500284411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:57.078016043 CET500284411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:57.078454018 CET500294411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:57.083003998 CET441150028178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:57.083448887 CET441150029178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:57.083530903 CET500294411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:57.084418058 CET500294411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:57.089308977 CET441150029178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:57.089446068 CET500294411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:57.094324112 CET441150029178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:57.617887020 CET441150029178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:57.618094921 CET500294411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:59.721303940 CET500294411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:59.721618891 CET500304411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:59.726670980 CET441150029178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:59.727233887 CET441150030178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:59.727299929 CET500304411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:59.727935076 CET500304411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:59.733284950 CET441150030178.215.236.227192.168.2.5
                    Jan 12, 2025 04:24:59.733370066 CET500304411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:24:59.738159895 CET441150030178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:00.270706892 CET441150030178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:00.270768881 CET500304411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:02.285058975 CET500304411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:02.285367966 CET500314411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:02.293831110 CET441150030178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:02.293853045 CET441150031178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:02.293940067 CET500314411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:02.294495106 CET500314411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:02.299344063 CET441150031178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:02.299416065 CET500314411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:02.304260969 CET441150031178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:02.830430031 CET441150031178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:02.830676079 CET500314411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:04.832267046 CET500314411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:04.832514048 CET500324411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:04.837383032 CET441150031178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:04.837479115 CET441150032178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:04.837557077 CET500324411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:04.838351965 CET500324411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:04.843183041 CET441150032178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:04.843267918 CET500324411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:04.848439932 CET441150032178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:05.387202978 CET441150032178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:05.387298107 CET500324411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:07.438287020 CET500324411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:07.443480015 CET441150032178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:07.482682943 CET500334411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:07.487715006 CET441150033178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:07.487818003 CET500334411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:07.566772938 CET500334411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:07.571914911 CET441150033178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:07.571994066 CET500334411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:07.576936007 CET441150033178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:08.039426088 CET441150033178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:08.039525986 CET500334411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:10.052290916 CET500334411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:10.052469015 CET500344411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:10.057626009 CET441150033178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:10.057670116 CET441150034178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:10.057749033 CET500344411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:10.058311939 CET500344411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:10.063200951 CET441150034178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:10.063281059 CET500344411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:10.068231106 CET441150034178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:10.633301973 CET441150034178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:10.633404016 CET500344411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:12.644598007 CET500344411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:12.644946098 CET500354411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:12.649730921 CET441150034178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:12.649878025 CET441150035178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:12.649957895 CET500354411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:12.650831938 CET500354411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:12.655623913 CET441150035178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:12.655698061 CET500354411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:12.660608053 CET441150035178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:13.187942028 CET441150035178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:13.188163996 CET500354411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:15.287062883 CET500354411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:15.292382956 CET441150035178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:17.168960094 CET500364411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:17.174012899 CET441150036178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:17.174115896 CET500364411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:17.174700022 CET500364411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:17.179575920 CET441150036178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:17.179658890 CET500364411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:17.184534073 CET441150036178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:17.723752975 CET441150036178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:17.723972082 CET500364411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:19.761908054 CET500364411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:19.762166023 CET500374411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:19.766943932 CET441150036178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:19.767080069 CET441150037178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:19.767153025 CET500374411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:20.309241056 CET441150037178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:20.309309959 CET500374411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:21.035331964 CET500374411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:21.041033030 CET441150037178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:23.083003044 CET500384411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:23.088196993 CET441150038178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:23.088305950 CET500384411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:23.089087009 CET500384411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:23.094019890 CET441150038178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:23.094140053 CET500384411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:23.099080086 CET441150038178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:23.622284889 CET441150038178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:23.622494936 CET500384411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:25.628880978 CET500384411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:25.629303932 CET500394411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:25.634110928 CET441150038178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:25.634311914 CET441150039178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:25.634393930 CET500394411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:25.667622089 CET500394411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:25.672529936 CET441150039178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:25.672614098 CET500394411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:25.677604914 CET441150039178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:26.184647083 CET441150039178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:26.184753895 CET500394411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:28.194820881 CET500394411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:28.195122957 CET500404411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:28.199845076 CET441150039178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:28.200119972 CET441150040178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:28.200212002 CET500404411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:28.200675964 CET500404411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:28.205548048 CET441150040178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:28.205667019 CET500404411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:28.210606098 CET441150040178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:28.737884045 CET441150040178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:28.737970114 CET500404411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:30.741086960 CET500404411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:30.741367102 CET500414411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:30.746176958 CET441150040178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:30.746298075 CET441150041178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:30.746371984 CET500414411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:30.746918917 CET500414411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:30.751779079 CET441150041178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:30.751877069 CET500414411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:30.756752014 CET441150041178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:31.280711889 CET441150041178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:31.280797958 CET500414411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:33.293019056 CET500414411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:33.293541908 CET500424411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:33.298057079 CET441150041178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:33.298552990 CET441150042178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:33.298643112 CET500424411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:33.299499989 CET500424411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:33.304296970 CET441150042178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:33.304394007 CET500424411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:33.309217930 CET441150042178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:33.833637953 CET441150042178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:33.833844900 CET500424411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:35.847599983 CET500424411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:35.847889900 CET500434411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:35.853315115 CET441150042178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:35.853595972 CET441150043178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:35.853686094 CET500434411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:35.854273081 CET500434411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:35.859865904 CET441150043178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:35.859937906 CET500434411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:35.865541935 CET441150043178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:36.410429001 CET441150043178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:36.410535097 CET500434411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:38.528431892 CET500434411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:38.533643961 CET441150043178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:38.544204950 CET500444411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:38.549107075 CET441150044178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:38.549191952 CET500444411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:38.549789906 CET500444411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:38.554632902 CET441150044178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:38.554692984 CET500444411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:38.559595108 CET441150044178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:39.090512991 CET441150044178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:39.090599060 CET500444411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:41.097585917 CET500444411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:41.098030090 CET500454411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:41.102828026 CET441150044178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:41.102984905 CET441150045178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:41.103065014 CET500454411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:41.103549957 CET500454411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:41.108437061 CET441150045178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:41.108546972 CET500454411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:41.113452911 CET441150045178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:41.636621952 CET441150045178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:41.636723995 CET500454411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:43.644682884 CET500454411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:43.644915104 CET500464411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:43.649913073 CET441150045178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:43.649955988 CET441150046178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:43.650022030 CET500464411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:44.190464973 CET441150046178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:44.190696001 CET500464411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:44.495050907 CET500464411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:44.500055075 CET441150046178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:46.538012028 CET500474411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:46.543023109 CET441150047178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:46.543116093 CET500474411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:46.839517117 CET500474411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:46.844681978 CET441150047178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:46.844779968 CET500474411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:46.849740028 CET441150047178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:47.077794075 CET441150047178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:47.077975988 CET500474411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:49.083506107 CET500474411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:49.088643074 CET441150047178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:49.469706059 CET500484411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:49.474879980 CET441150048178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:49.474984884 CET500484411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:49.475532055 CET500484411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:49.480490923 CET441150048178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:49.480566025 CET500484411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:49.485460043 CET441150048178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:50.001027107 CET441150048178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:50.001112938 CET500484411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:52.004786968 CET500484411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:52.005148888 CET500494411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:52.009910107 CET441150048178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:52.010072947 CET441150049178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:52.010149956 CET500494411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:52.010915995 CET500494411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:52.015717030 CET441150049178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:52.016522884 CET500494411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:52.021399975 CET441150049178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:52.543436050 CET441150049178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:52.546598911 CET500494411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:54.554687023 CET500494411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:54.555236101 CET500504411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:54.559812069 CET441150049178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:54.560242891 CET441150050178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:54.560327053 CET500504411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:54.560745001 CET500504411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:54.565623045 CET441150050178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:54.565705061 CET500504411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:54.570636988 CET441150050178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:55.102514029 CET441150050178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:55.102600098 CET500504411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:57.181581974 CET500504411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:57.186892033 CET441150050178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:57.208071947 CET500514411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:57.213124037 CET441150051178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:57.213231087 CET500514411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:57.426206112 CET500514411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:57.431333065 CET441150051178.215.236.227192.168.2.5
                    Jan 12, 2025 04:25:57.431471109 CET500514411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:25:57.436405897 CET441150051178.215.236.227192.168.2.5
                    Jan 12, 2025 04:26:01.361521006 CET441150051178.215.236.227192.168.2.5
                    Jan 12, 2025 04:26:01.361567020 CET441150051178.215.236.227192.168.2.5
                    Jan 12, 2025 04:26:01.361601114 CET441150051178.215.236.227192.168.2.5
                    Jan 12, 2025 04:26:01.361757994 CET500514411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:26:01.361757994 CET500514411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:26:01.361757994 CET500514411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:26:03.363245964 CET500514411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:26:03.363775015 CET500524411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:26:03.368257999 CET441150051178.215.236.227192.168.2.5
                    Jan 12, 2025 04:26:03.368735075 CET441150052178.215.236.227192.168.2.5
                    Jan 12, 2025 04:26:03.370651007 CET500524411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:26:03.371823072 CET500524411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:26:03.376741886 CET441150052178.215.236.227192.168.2.5
                    Jan 12, 2025 04:26:03.376791000 CET500524411192.168.2.5178.215.236.227
                    Jan 12, 2025 04:26:03.381688118 CET441150052178.215.236.227192.168.2.5
                    Jan 12, 2025 04:26:03.925303936 CET441150052178.215.236.227192.168.2.5
                    Jan 12, 2025 04:26:03.925817013 CET500524411192.168.2.5178.215.236.227

                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:0
                    Start time:22:21:59
                    Start date:11/01/2025
                    Path:C:\Users\user\Desktop\Gv10VZCeN7.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\Gv10VZCeN7.exe"
                    Imagebase:0x620000
                    File size:95'232 bytes
                    MD5 hash:1ED0C2E213E674C8A95694C9E19361C7
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000000.00000002.2050391420.0000000003CD8000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: 00000000.00000002.2050391420.0000000003CD8000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                    • Rule: Njrat, Description: detect njRAT in memory, Source: 00000000.00000002.2050391420.0000000003CD8000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                    • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000000.00000000.2026002461.0000000000622000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: 00000000.00000000.2026002461.0000000000622000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                    • Rule: Njrat, Description: detect njRAT in memory, Source: 00000000.00000000.2026002461.0000000000622000.00000002.00000001.01000000.00000003.sdmp, Author: JPCERT/CC Incident Response Group
                    Reputation:low
                    Has exited:true

                    Target ID:2
                    Start time:22:22:01
                    Start date:11/01/2025
                    Path:C:\Users\user\server.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\server.exe"
                    Imagebase:0x7f0000
                    File size:95'232 bytes
                    MD5 hash:1ED0C2E213E674C8A95694C9E19361C7
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000002.00000002.4479519622.0000000002D21000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Users\user\server.exe, Author: Joe Security
                    • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Users\user\server.exe, Author: Joe Security
                    • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\Users\user\server.exe, Author: unknown
                    • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: C:\Users\user\server.exe, Author: Florian Roth
                    • Rule: crimeware_njrat_strings, Description: Detects njRAT based on some strings, Source: C:\Users\user\server.exe, Author: Sekoia.io
                    • Rule: Njrat, Description: detect njRAT in memory, Source: C:\Users\user\server.exe, Author: JPCERT/CC Incident Response Group
                    • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\server.exe, Author: ditekSHen
                    Antivirus matches:
                    • Detection: 100%, Avira
                    • Detection: 100%, Joe Sandbox ML
                    • Detection: 96%, ReversingLabs
                    Reputation:low
                    Has exited:false

                    Target ID:3
                    Start time:22:22:03
                    Start date:11/01/2025
                    Path:C:\Windows\SysWOW64\netsh.exe
                    Wow64 process (32bit):true
                    Commandline:netsh firewall add allowedprogram "C:\Users\user\server.exe" "server.exe" ENABLE
                    Imagebase:0x1080000
                    File size:82'432 bytes
                    MD5 hash:4E89A1A088BE715D6C946E55AB07C7DF
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:4
                    Start time:22:22:03
                    Start date:11/01/2025
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:5
                    Start time:22:22:04
                    Start date:11/01/2025
                    Path:C:\Windows\SysWOW64\netsh.exe
                    Wow64 process (32bit):true
                    Commandline:netsh firewall delete allowedprogram "C:\Users\user\server.exe"
                    Imagebase:0x1080000
                    File size:82'432 bytes
                    MD5 hash:4E89A1A088BE715D6C946E55AB07C7DF
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:6
                    Start time:22:22:04
                    Start date:11/01/2025
                    Path:C:\Windows\SysWOW64\netsh.exe
                    Wow64 process (32bit):true
                    Commandline:netsh firewall add allowedprogram "C:\Users\user\server.exe" "server.exe" ENABLE
                    Imagebase:0x1080000
                    File size:82'432 bytes
                    MD5 hash:4E89A1A088BE715D6C946E55AB07C7DF
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:7
                    Start time:22:22:04
                    Start date:11/01/2025
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:8
                    Start time:22:22:04
                    Start date:11/01/2025
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:9
                    Start time:22:22:14
                    Start date:11/01/2025
                    Path:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exe"
                    Imagebase:0x1e0000
                    File size:95'232 bytes
                    MD5 hash:1ED0C2E213E674C8A95694C9E19361C7
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exe, Author: Joe Security
                    • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exe, Author: unknown
                    • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exe, Author: Florian Roth
                    • Rule: crimeware_njrat_strings, Description: Detects njRAT based on some strings, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exe, Author: Sekoia.io
                    • Rule: Njrat, Description: detect njRAT in memory, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exe, Author: JPCERT/CC Incident Response Group
                    • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exe, Author: ditekSHen
                    • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exe, Author: ditekSHen
                    • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exe, Author: ditekSHen
                    • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exe, Author: ditekSHen
                    Antivirus matches:
                    • Detection: 100%, Avira
                    • Detection: 100%, Joe Sandbox ML
                    • Detection: 96%, ReversingLabs
                    Reputation:low
                    Has exited:true

                    Target ID:13
                    Start time:22:22:17
                    Start date:11/01/2025
                    Path:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\364d88128926b2e822553333b20c197fWindows Update.exe"
                    Imagebase:0x5d0000
                    File size:95'232 bytes
                    MD5 hash:1ED0C2E213E674C8A95694C9E19361C7
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:low
                    Has exited:true

                    Target ID:14
                    Start time:22:22:23
                    Start date:11/01/2025
                    Path:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exe"
                    Imagebase:0x970000
                    File size:95'232 bytes
                    MD5 hash:1ED0C2E213E674C8A95694C9E19361C7
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exe, Author: Joe Security
                    • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exe, Author: unknown
                    • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exe, Author: Florian Roth
                    • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exe, Author: Florian Roth
                    • Rule: crimeware_njrat_strings, Description: Detects njRAT based on some strings, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exe, Author: Sekoia.io
                    • Rule: crimeware_njrat_strings, Description: Detects njRAT based on some strings, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exe, Author: Sekoia.io
                    • Rule: Njrat, Description: detect njRAT in memory, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exe, Author: JPCERT/CC Incident Response Group
                    • Rule: Njrat, Description: detect njRAT in memory, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exe, Author: JPCERT/CC Incident Response Group
                    • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.exe, Author: ditekSHen
                    Antivirus matches:
                    • Detection: 100%, Avira
                    • Detection: 100%, Joe Sandbox ML
                    • Detection: 96%, ReversingLabs
                    Reputation:low
                    Has exited:true

                    Target ID:15
                    Start time:22:22:33
                    Start date:11/01/2025
                    Path:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe"
                    Imagebase:0xb10000
                    File size:95'232 bytes
                    MD5 hash:1ED0C2E213E674C8A95694C9E19361C7
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Antivirus matches:
                    • Detection: 96%, ReversingLabs
                    Reputation:low
                    Has exited:true

                    Reset < >

                      Execution Graph

                      Execution Coverage:2.4%
                      Dynamic/Decrypted Code Coverage:100%
                      Signature Coverage:0%
                      Total number of Nodes:58
                      Total number of Limit Nodes:4
                      execution_graph 14170 dfa9bf 14172 dfa9c9 SetErrorMode 14170->14172 14173 dfaa53 14172->14173 14127 dfabbe 14128 dfabea CloseHandle 14127->14128 14129 dfac29 14127->14129 14130 dfabf8 14128->14130 14129->14128 14131 dfa65e 14132 dfa68a OleInitialize 14131->14132 14133 dfa6c0 14131->14133 14134 dfa698 14132->14134 14133->14132 14190 dfa61e 14192 dfa65e OleInitialize 14190->14192 14193 dfa698 14192->14193 14174 dfab7c 14175 dfabbe CloseHandle 14174->14175 14177 dfabf8 14175->14177 14135 dfa59a 14136 dfa5d8 DuplicateHandle 14135->14136 14137 dfa610 14135->14137 14138 dfa5e6 14136->14138 14137->14136 14178 dfae77 14179 dfaeae WriteFile 14178->14179 14181 dfaf15 14179->14181 14194 dfac37 14195 dfac6a GetFileType 14194->14195 14197 dfaccc 14195->14197 14198 dfb036 14199 dfb06a CreateMutexW 14198->14199 14201 dfb0e5 14199->14201 14182 dfaa75 14185 dfaaa6 CreateFileW 14182->14185 14184 dfab2d 14185->14184 14186 dfa573 14187 dfa59a DuplicateHandle 14186->14187 14189 dfa5e6 14187->14189 14139 dfaa12 14140 dfaa3e SetErrorMode 14139->14140 14141 dfaa67 14139->14141 14142 dfaa53 14140->14142 14141->14140 14143 dfaeae 14145 dfaee3 WriteFile 14143->14145 14146 dfaf15 14145->14146 14166 dfa6ce 14167 dfa72e OleGetClipboard 14166->14167 14169 dfa78c 14167->14169 14150 dfb06a 14151 dfb0a2 CreateMutexW 14150->14151 14153 dfb0e5 14151->14153 14158 dfaaa6 14159 dfaade CreateFileW 14158->14159 14161 dfab2d 14159->14161 14162 dfb446 14163 dfb46c ShellExecuteExW 14162->14163 14165 dfb488 14163->14165 14202 dfb424 14205 dfb446 ShellExecuteExW 14202->14205 14204 dfb488 14205->14204

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 0 4df4290-4df42c1 2 4df434a-4df4352 0->2 3 4df42c7-4df4348 0->3 4 4df435e-4df4372 2->4 3->2 30 4df4354 3->30 5 4df4378-4df43b4 4->5 6 4df4527-4df4675 4->6 17 4df43b6-4df43de 5->17 18 4df43e5-4df44e2 5->18 44 4df467b-4df47ca 6->44 45 4df4805-4df4819 6->45 17->18 140 4df44e7 18->140 30->4 44->45 46 4df481f-4df492c 45->46 47 4df4967-4df497b 45->47 46->47 50 4df49ce-4df49e2 47->50 51 4df497d-4df4993 call 4df4208 47->51 53 4df4a2a-4df4a3e 50->53 54 4df49e4-4df49ef 50->54 51->50 57 4df4b8c-4df4ba0 53->57 58 4df4a44-4df4b51 53->58 54->53 62 4df4ccc-4df4ce0 57->62 63 4df4ba6-4df4bba 57->63 58->57 71 4df4f6c-4df4f80 62->71 72 4df4ce6-4df4f25 62->72 68 4df4bbc-4df4bc3 63->68 69 4df4bc8-4df4bdc 63->69 74 4df4c40-4df4c54 68->74 75 4df4bde-4df4be5 69->75 76 4df4be7-4df4bfb 69->76 77 4df4fda-4df4fee 71->77 78 4df4f82-4df4f93 71->78 72->71 83 4df4c6e-4df4c7a 74->83 84 4df4c56-4df4c6c 74->84 75->74 87 4df4bfd-4df4c04 76->87 88 4df4c06-4df4c1a 76->88 80 4df503d-4df5051 77->80 81 4df4ff0-4df4ff6 77->81 78->77 92 4df509a-4df50ae 80->92 93 4df5053 80->93 81->80 91 4df4c85 83->91 84->91 87->74 89 4df4c1c-4df4c23 88->89 90 4df4c25-4df4c39 88->90 89->74 90->74 97 4df4c3b-4df4c3d 90->97 91->62 99 4df5125-4df5139 92->99 100 4df50b0-4df50d9 92->100 93->92 97->74 107 4df513f-4df535b 99->107 108 4df53ac-4df53c0 99->108 100->99 493 4df535f 107->493 494 4df535d 107->494 112 4df5496-4df54aa 108->112 113 4df53c6-4df544f 108->113 117 4df5667-4df567b 112->117 118 4df54b0-4df5620 112->118 113->112 124 4df57de-4df57f2 117->124 125 4df5681-4df5797 117->125 118->117 130 4df57f8-4df590e 124->130 131 4df5955-4df5969 124->131 125->124 130->131 136 4df596f-4df5a85 131->136 137 4df5acc-4df5ae0 131->137 136->137 143 4df5ae6-4df5bfc 137->143 144 4df5c43-4df5c57 137->144 140->6 143->144 149 4df5c5d-4df5d73 144->149 150 4df5dba-4df5dce 144->150 149->150 157 4df5dd4-4df5eea 150->157 158 4df5f31-4df5f45 150->158 157->158 169 4df5f4b-4df6061 158->169 170 4df60a8-4df60bc 158->170 169->170 179 4df621f-4df6233 170->179 180 4df60c2-4df61d8 170->180 188 4df6239-4df634f 179->188 189 4df6396-4df63aa 179->189 180->179 188->189 196 4df652e-4df6542 189->196 197 4df63b0-4df63f5 call 4df4270 189->197 202 4df6548-4df6567 196->202 203 4df6685-4df6699 196->203 321 4df64b5-4df64d7 197->321 235 4df660c-4df662e 202->235 214 4df669f-4df679f 203->214 215 4df67e6-4df67fa 203->215 214->215 232 4df6947-4df695b 215->232 233 4df6800-4df6900 215->233 240 4df6aa8-4df6ad2 232->240 241 4df6961-4df6a61 232->241 233->232 247 4df656c-4df657b 235->247 248 4df6634 235->248 262 4df6ad8-4df6b4b 240->262 263 4df6b92-4df6ba6 240->263 241->240 259 4df6636 247->259 260 4df6581-4df65b4 247->260 248->203 292 4df663b-4df6683 259->292 352 4df65fb-4df6604 260->352 353 4df65b6-4df65f0 260->353 262->263 277 4df6bac-4df6c3c 263->277 278 4df6c83-4df6c97 263->278 277->278 283 4df6ddd-4df6df1 278->283 284 4df6c9d-4df6d96 278->284 297 4df6df7-4df6e47 283->297 298 4df7054-4df7068 283->298 284->283 292->203 411 4df6e49-4df6e6f 297->411 412 4df6eb5-4df6ee0 297->412 316 4df706e-4df7109 call 4df4270 * 2 298->316 317 4df7150-4df7157 298->317 316->317 333 4df64dd 321->333 334 4df63fa-4df6409 321->334 333->196 349 4df64df 334->349 350 4df640f-4df64ad 334->350 381 4df64e4-4df652c 349->381 350->381 495 4df64af 350->495 352->292 363 4df6606 352->363 353->352 363->235 381->196 488 4df6e71-4df6e91 411->488 489 4df6eb0 411->489 491 4df6fbe-4df704f 412->491 492 4df6ee6-4df6fb9 412->492 488->489 489->298 491->298 492->298 496 4df5365 493->496 494->496 495->321 496->108
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2050531484.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4df0000_Gv10VZCeN7.jbxd
                      Similarity
                      • API ID:
                      • String ID: @$|t
                      • API String ID: 0-3910548985
                      • Opcode ID: 422d4c47b9b565a858869e3740cccfa4ed238badd60954fa5840460960eeae49
                      • Instruction ID: 9d89c557c26842e426a4bf72691597eb57f3cb8eff06e9f3be0cd63ce9548404
                      • Opcode Fuzzy Hash: 422d4c47b9b565a858869e3740cccfa4ed238badd60954fa5840460960eeae49
                      • Instruction Fuzzy Hash: A7232A74A02228CFDB64EB34DD54BA9B7B2FB48304F1041E9E909A73A5DB359E95CF40

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 555 4df427f-4df42c1 557 4df434a-4df4352 555->557 558 4df42c7-4df4348 555->558 559 4df435e-4df4372 557->559 558->557 585 4df4354 558->585 560 4df4378-4df43b4 559->560 561 4df4527-4df4675 559->561 572 4df43b6-4df43de 560->572 573 4df43e5-4df44e2 560->573 599 4df467b-4df47ca 561->599 600 4df4805-4df4819 561->600 572->573 695 4df44e7 573->695 585->559 599->600 601 4df481f-4df492c 600->601 602 4df4967-4df497b 600->602 601->602 605 4df49ce-4df49e2 602->605 606 4df497d-4df4993 call 4df4208 602->606 608 4df4a2a-4df4a3e 605->608 609 4df49e4-4df49ef 605->609 606->605 612 4df4b8c-4df4ba0 608->612 613 4df4a44-4df4b51 608->613 609->608 617 4df4ccc-4df4ce0 612->617 618 4df4ba6-4df4bba 612->618 613->612 626 4df4f6c-4df4f80 617->626 627 4df4ce6-4df4f25 617->627 623 4df4bbc-4df4bc3 618->623 624 4df4bc8-4df4bdc 618->624 629 4df4c40-4df4c54 623->629 630 4df4bde-4df4be5 624->630 631 4df4be7-4df4bfb 624->631 632 4df4fda-4df4fee 626->632 633 4df4f82-4df4f93 626->633 627->626 638 4df4c6e-4df4c7a 629->638 639 4df4c56-4df4c6c 629->639 630->629 642 4df4bfd-4df4c04 631->642 643 4df4c06-4df4c1a 631->643 635 4df503d-4df5051 632->635 636 4df4ff0-4df4ff6 632->636 633->632 647 4df509a-4df50ae 635->647 648 4df5053 635->648 636->635 646 4df4c85 638->646 639->646 642->629 644 4df4c1c-4df4c23 643->644 645 4df4c25-4df4c39 643->645 644->629 645->629 652 4df4c3b-4df4c3d 645->652 646->617 654 4df5125-4df5139 647->654 655 4df50b0-4df50d9 647->655 648->647 652->629 662 4df513f-4df535b 654->662 663 4df53ac-4df53c0 654->663 655->654 1048 4df535f 662->1048 1049 4df535d 662->1049 667 4df5496-4df54aa 663->667 668 4df53c6-4df544f 663->668 672 4df5667-4df567b 667->672 673 4df54b0-4df5620 667->673 668->667 679 4df57de-4df57f2 672->679 680 4df5681-4df5797 672->680 673->672 685 4df57f8-4df590e 679->685 686 4df5955-4df5969 679->686 680->679 685->686 691 4df596f-4df5a85 686->691 692 4df5acc-4df5ae0 686->692 691->692 698 4df5ae6-4df5bfc 692->698 699 4df5c43-4df5c57 692->699 695->561 698->699 704 4df5c5d-4df5d73 699->704 705 4df5dba-4df5dce 699->705 704->705 712 4df5dd4-4df5eea 705->712 713 4df5f31-4df5f45 705->713 712->713 724 4df5f4b-4df6061 713->724 725 4df60a8-4df60bc 713->725 724->725 734 4df621f-4df6233 725->734 735 4df60c2-4df61d8 725->735 743 4df6239-4df634f 734->743 744 4df6396-4df63aa 734->744 735->734 743->744 751 4df652e-4df6542 744->751 752 4df63b0-4df63f5 call 4df4270 744->752 757 4df6548-4df6567 751->757 758 4df6685-4df6699 751->758 876 4df64b5-4df64d7 752->876 790 4df660c-4df662e 757->790 769 4df669f-4df679f 758->769 770 4df67e6-4df67fa 758->770 769->770 787 4df6947-4df695b 770->787 788 4df6800-4df6900 770->788 795 4df6aa8-4df6ad2 787->795 796 4df6961-4df6a61 787->796 788->787 802 4df656c-4df657b 790->802 803 4df6634 790->803 817 4df6ad8-4df6b4b 795->817 818 4df6b92-4df6ba6 795->818 796->795 814 4df6636 802->814 815 4df6581-4df65b4 802->815 803->758 847 4df663b-4df6683 814->847 907 4df65fb-4df6604 815->907 908 4df65b6-4df65f0 815->908 817->818 832 4df6bac-4df6c3c 818->832 833 4df6c83-4df6c97 818->833 832->833 838 4df6ddd-4df6df1 833->838 839 4df6c9d-4df6d96 833->839 852 4df6df7-4df6e47 838->852 853 4df7054-4df7068 838->853 839->838 847->758 966 4df6e49-4df6e6f 852->966 967 4df6eb5-4df6ee0 852->967 871 4df706e-4df7109 call 4df4270 * 2 853->871 872 4df7150-4df7157 853->872 871->872 888 4df64dd 876->888 889 4df63fa-4df6409 876->889 888->751 904 4df64df 889->904 905 4df640f-4df64ad 889->905 936 4df64e4-4df652c 904->936 905->936 1050 4df64af 905->1050 907->847 918 4df6606 907->918 908->907 918->790 936->751 1043 4df6e71-4df6e91 966->1043 1044 4df6eb0 966->1044 1046 4df6fbe-4df704f 967->1046 1047 4df6ee6-4df6fb9 967->1047 1043->1044 1044->853 1046->853 1047->853 1051 4df5365 1048->1051 1049->1051 1050->876 1051->663
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2050531484.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4df0000_Gv10VZCeN7.jbxd
                      Similarity
                      • API ID:
                      • String ID: $|t
                      • API String ID: 0-1654681884
                      • Opcode ID: 99603e7456a77043bad43ea67559c6ac36a9f343a9f6244cf69399eb7e6293a7
                      • Instruction ID: 7015096a325237e5db033ea26ffff13f7349cce110141d2f82ddf740b2d12746
                      • Opcode Fuzzy Hash: 99603e7456a77043bad43ea67559c6ac36a9f343a9f6244cf69399eb7e6293a7
                      • Instruction Fuzzy Hash: 56131B74A02128CFDB64EB34DD54BA9B7B2FB48304F1041E9E909A73A5DB359E95CF40

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1110 4df01e1-4df0200 1124 4df0202 call 11e0606 1110->1124 1125 4df0202 call 11e05e0 1110->1125 1113 4df0208-4df0288 1124->1113 1125->1113
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2050531484.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4df0000_Gv10VZCeN7.jbxd
                      Similarity
                      • API ID:
                      • String ID: HQ$XR$P
                      • API String ID: 0-2787943518
                      • Opcode ID: d41185a7c8508f8786d4801583a8a30b673326cb00988cd322d1b76189835428
                      • Instruction ID: 41c8a8ccda88364057082b2e09a785e980baecd01b5143840120ffe24db1e48d
                      • Opcode Fuzzy Hash: d41185a7c8508f8786d4801583a8a30b673326cb00988cd322d1b76189835428
                      • Instruction Fuzzy Hash: 6C016170206246DFC710EB78D649A6D77E1EFC4309B149828B2458B69ADF3598488F62

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1126 dfaa75-dfaafe 1130 dfab03-dfab0f 1126->1130 1131 dfab00 1126->1131 1132 dfab14-dfab1d 1130->1132 1133 dfab11 1130->1133 1131->1130 1134 dfab1f-dfab43 CreateFileW 1132->1134 1135 dfab6e-dfab73 1132->1135 1133->1132 1138 dfab75-dfab7a 1134->1138 1139 dfab45-dfab6b 1134->1139 1135->1134 1138->1139
                      APIs
                      • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 00DFAB25
                      Memory Dump Source
                      • Source File: 00000000.00000002.2049651306.0000000000DFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DFA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_dfa000_Gv10VZCeN7.jbxd
                      Similarity
                      • API ID: CreateFile
                      • String ID:
                      • API String ID: 823142352-0
                      • Opcode ID: eef44470d296ffcabe4c9707be357d0d18fdd751761e99bd3613c1ac6d6de12d
                      • Instruction ID: f64c9230bf2d00e7f057509084eee076a47dfd8055c95dad2326a6590e4017bb
                      • Opcode Fuzzy Hash: eef44470d296ffcabe4c9707be357d0d18fdd751761e99bd3613c1ac6d6de12d
                      • Instruction Fuzzy Hash: 2E318271509344AFE721CF25DC84F56BBF8EF05310F09849EE9498B652D365E808CB72

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1142 dfb036-dfb0b9 1146 dfb0be-dfb0c7 1142->1146 1147 dfb0bb 1142->1147 1148 dfb0cc-dfb0d5 1146->1148 1149 dfb0c9 1146->1149 1147->1146 1150 dfb0d7-dfb0fb CreateMutexW 1148->1150 1151 dfb126-dfb12b 1148->1151 1149->1148 1154 dfb12d-dfb132 1150->1154 1155 dfb0fd-dfb123 1150->1155 1151->1150 1154->1155
                      APIs
                      • CreateMutexW.KERNELBASE(?,?), ref: 00DFB0DD
                      Memory Dump Source
                      • Source File: 00000000.00000002.2049651306.0000000000DFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DFA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_dfa000_Gv10VZCeN7.jbxd
                      Similarity
                      • API ID: CreateMutex
                      • String ID:
                      • API String ID: 1964310414-0
                      • Opcode ID: d7413f7a893d9f69a825b45b010315f38b2fbb97fb9a534f28a6a4d78c4ec199
                      • Instruction ID: 60e5f31404c5c31d4b7e788801d43e136e3e8b01d6f876de4ae8e4fc32f5845e
                      • Opcode Fuzzy Hash: d7413f7a893d9f69a825b45b010315f38b2fbb97fb9a534f28a6a4d78c4ec199
                      • Instruction Fuzzy Hash: 8131B5715093846FE711CB25DC45BA6BFF8EF06310F08849AE944CB292D365E908C772

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1158 dfa6ce-dfa72b 1159 dfa72e-dfa786 OleGetClipboard 1158->1159 1161 dfa78c-dfa7a2 1159->1161
                      APIs
                      • OleGetClipboard.OLE32(?,00000E24,?,?), ref: 00DFA77E
                      Memory Dump Source
                      • Source File: 00000000.00000002.2049651306.0000000000DFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DFA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_dfa000_Gv10VZCeN7.jbxd
                      Similarity
                      • API ID: Clipboard
                      • String ID:
                      • API String ID: 220874293-0
                      • Opcode ID: fda4e287d4472bb02eb83aea7c9b628d20d27cab0b8b1dff0cce102d69163129
                      • Instruction ID: 7821a58ff421738ba8eaeef5b9af8fb2879a2865711989d29c8425502184899a
                      • Opcode Fuzzy Hash: fda4e287d4472bb02eb83aea7c9b628d20d27cab0b8b1dff0cce102d69163129
                      • Instruction Fuzzy Hash: 1331717504D3C06FD3138B259C61B62BFB4EF47610F0A40CBD884CB6A3D2256919D772

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1162 dfae77-dfaf05 1166 dfaf49-dfaf4e 1162->1166 1167 dfaf07-dfaf27 WriteFile 1162->1167 1166->1167 1170 dfaf29-dfaf46 1167->1170 1171 dfaf50-dfaf55 1167->1171 1171->1170
                      APIs
                      • WriteFile.KERNELBASE(?,00000E24,5E180306,00000000,00000000,00000000,00000000), ref: 00DFAF0D
                      Memory Dump Source
                      • Source File: 00000000.00000002.2049651306.0000000000DFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DFA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_dfa000_Gv10VZCeN7.jbxd
                      Similarity
                      • API ID: FileWrite
                      • String ID:
                      • API String ID: 3934441357-0
                      • Opcode ID: 4f019636a76362db816d734704dc6f73f0ff76549e7790d7107516dd1bba46cb
                      • Instruction ID: d2ba6ade0961b1e6b05572449c530d565fb8d1d9f11d86f37af69d5502a205f6
                      • Opcode Fuzzy Hash: 4f019636a76362db816d734704dc6f73f0ff76549e7790d7107516dd1bba46cb
                      • Instruction Fuzzy Hash: 2321E7B1509384AFD722CF11DC44F96BFB8EF16314F09849AE9488F152D335A509CB71

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1174 dfaaa6-dfaafe 1177 dfab03-dfab0f 1174->1177 1178 dfab00 1174->1178 1179 dfab14-dfab1d 1177->1179 1180 dfab11 1177->1180 1178->1177 1181 dfab1f-dfab27 CreateFileW 1179->1181 1182 dfab6e-dfab73 1179->1182 1180->1179 1183 dfab2d-dfab43 1181->1183 1182->1181 1185 dfab75-dfab7a 1183->1185 1186 dfab45-dfab6b 1183->1186 1185->1186
                      APIs
                      • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 00DFAB25
                      Memory Dump Source
                      • Source File: 00000000.00000002.2049651306.0000000000DFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DFA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_dfa000_Gv10VZCeN7.jbxd
                      Similarity
                      • API ID: CreateFile
                      • String ID:
                      • API String ID: 823142352-0
                      • Opcode ID: df703b92f0437689f5b0b1237b81102a4ef3b3f0f51f7adfcc369c00cff8b24c
                      • Instruction ID: fb7e5ab20cab15cff7173bf1a04a68819c2a304f6779439148df077930eade9c
                      • Opcode Fuzzy Hash: df703b92f0437689f5b0b1237b81102a4ef3b3f0f51f7adfcc369c00cff8b24c
                      • Instruction Fuzzy Hash: 7F21A1B1604204AFE720CF29DC84B66FBE8EF18710F088469EA498B751D375E808CB72

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1189 dfa9bf-dfaa3c 1194 dfaa3e-dfaa51 SetErrorMode 1189->1194 1195 dfaa67-dfaa6c 1189->1195 1196 dfaa6e-dfaa73 1194->1196 1197 dfaa53-dfaa66 1194->1197 1195->1194 1196->1197
                      APIs
                      • SetErrorMode.KERNELBASE(?), ref: 00DFAA44
                      Memory Dump Source
                      • Source File: 00000000.00000002.2049651306.0000000000DFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DFA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_dfa000_Gv10VZCeN7.jbxd
                      Similarity
                      • API ID: ErrorMode
                      • String ID:
                      • API String ID: 2340568224-0
                      • Opcode ID: 5b446a79e038771954b2024f21ba902e3a068db3c43af1c02eb30c5be52872f1
                      • Instruction ID: caae9a6d3a5c5faec9954bf71d0502b13bd0cee58a26d58174d9306397da628c
                      • Opcode Fuzzy Hash: 5b446a79e038771954b2024f21ba902e3a068db3c43af1c02eb30c5be52872f1
                      • Instruction Fuzzy Hash: 0A21396540E3C49FD7138B258C64651BFB4EF53624B0E80DBD9848F6A3C2685809CB72

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1200 dfac37-dfacb5 1204 dfacea-dfacef 1200->1204 1205 dfacb7-dfacca GetFileType 1200->1205 1204->1205 1206 dfaccc-dface9 1205->1206 1207 dfacf1-dfacf6 1205->1207 1207->1206
                      APIs
                      • GetFileType.KERNELBASE(?,00000E24,5E180306,00000000,00000000,00000000,00000000), ref: 00DFACBD
                      Memory Dump Source
                      • Source File: 00000000.00000002.2049651306.0000000000DFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DFA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_dfa000_Gv10VZCeN7.jbxd
                      Similarity
                      • API ID: FileType
                      • String ID:
                      • API String ID: 3081899298-0
                      • Opcode ID: 55f4355a8f3eeea4f04b2c9641863c53fb6d5fe59f83c9ce149fd4b64bd12aa4
                      • Instruction ID: 8af2585665619608c17e596a7818b721ecebae2bb6a49561f82045986f763498
                      • Opcode Fuzzy Hash: 55f4355a8f3eeea4f04b2c9641863c53fb6d5fe59f83c9ce149fd4b64bd12aa4
                      • Instruction Fuzzy Hash: 4021E7B55093846FE7128B11DC80BE2BFB8EF57714F0980DBE9848B293D364A909D772

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1211 dfb06a-dfb0b9 1214 dfb0be-dfb0c7 1211->1214 1215 dfb0bb 1211->1215 1216 dfb0cc-dfb0d5 1214->1216 1217 dfb0c9 1214->1217 1215->1214 1218 dfb0d7-dfb0df CreateMutexW 1216->1218 1219 dfb126-dfb12b 1216->1219 1217->1216 1220 dfb0e5-dfb0fb 1218->1220 1219->1218 1222 dfb12d-dfb132 1220->1222 1223 dfb0fd-dfb123 1220->1223 1222->1223
                      APIs
                      • CreateMutexW.KERNELBASE(?,?), ref: 00DFB0DD
                      Memory Dump Source
                      • Source File: 00000000.00000002.2049651306.0000000000DFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DFA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_dfa000_Gv10VZCeN7.jbxd
                      Similarity
                      • API ID: CreateMutex
                      • String ID:
                      • API String ID: 1964310414-0
                      • Opcode ID: a0f1b67cd7a965dee559b028e2e22ceff9c241f6e8910ebd36febb471adf4d89
                      • Instruction ID: c5407b56924d3b9cabd768e53a046d3258b35baa8abde65a7d4fde76c6fdbf53
                      • Opcode Fuzzy Hash: a0f1b67cd7a965dee559b028e2e22ceff9c241f6e8910ebd36febb471adf4d89
                      • Instruction Fuzzy Hash: 9D21B371600204AFE720DF25DD85BA6FBE8EF15324F08C46AEE498B741D775E808CA72

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1226 dfa61e-dfa688 1228 dfa68a-dfa692 OleInitialize 1226->1228 1229 dfa6c0-dfa6c5 1226->1229 1231 dfa698-dfa6aa 1228->1231 1229->1228 1232 dfa6ac-dfa6bf 1231->1232 1233 dfa6c7-dfa6cc 1231->1233 1233->1232
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2049651306.0000000000DFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DFA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_dfa000_Gv10VZCeN7.jbxd
                      Similarity
                      • API ID: Initialize
                      • String ID:
                      • API String ID: 2538663250-0
                      • Opcode ID: 89bac4cbed5c3a3979d11a67f3266d1b4c0ddf0ad38a38bd0ca4102a1aa87530
                      • Instruction ID: 9aeb74f3209d7c09117c78ed643402db59f1e5a61db1f7d8d3a16d44cc1c4b01
                      • Opcode Fuzzy Hash: 89bac4cbed5c3a3979d11a67f3266d1b4c0ddf0ad38a38bd0ca4102a1aa87530
                      • Instruction Fuzzy Hash: DE21497150E3C45FDB128B259C94652BFB4DF07220F0E84DBD9858F2A3D2699908CB72

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1235 dfa573-dfa5d6 1237 dfa5d8-dfa5e0 DuplicateHandle 1235->1237 1238 dfa610-dfa615 1235->1238 1239 dfa5e6-dfa5f8 1237->1239 1238->1237 1241 dfa5fa-dfa60d 1239->1241 1242 dfa617-dfa61c 1239->1242 1242->1241
                      APIs
                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00DFA5DE
                      Memory Dump Source
                      • Source File: 00000000.00000002.2049651306.0000000000DFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DFA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_dfa000_Gv10VZCeN7.jbxd
                      Similarity
                      • API ID: DuplicateHandle
                      • String ID:
                      • API String ID: 3793708945-0
                      • Opcode ID: a1543660b3f53939f5b65ff6131ccf3754ece846ca084d3cece14f729843363d
                      • Instruction ID: f167a10a704a517c959deae183ed5b311a560c79ad1325968430fa58fafb3afc
                      • Opcode Fuzzy Hash: a1543660b3f53939f5b65ff6131ccf3754ece846ca084d3cece14f729843363d
                      • Instruction Fuzzy Hash: 7511A571409780AFDB228F54DC44A62FFF4EF46710F08889AED858B162C235A818DB62

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1244 dfaeae-dfaf05 1247 dfaf49-dfaf4e 1244->1247 1248 dfaf07-dfaf0f WriteFile 1244->1248 1247->1248 1249 dfaf15-dfaf27 1248->1249 1251 dfaf29-dfaf46 1249->1251 1252 dfaf50-dfaf55 1249->1252 1252->1251
                      APIs
                      • WriteFile.KERNELBASE(?,00000E24,5E180306,00000000,00000000,00000000,00000000), ref: 00DFAF0D
                      Memory Dump Source
                      • Source File: 00000000.00000002.2049651306.0000000000DFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DFA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_dfa000_Gv10VZCeN7.jbxd
                      Similarity
                      • API ID: FileWrite
                      • String ID:
                      • API String ID: 3934441357-0
                      • Opcode ID: 32b7e747cd8ec2ded8a9115f1ef6f478138b1009968244f12dcb29ea84e0cc9d
                      • Instruction ID: b75d196b06bed79ad44a2d46999387cd59f07d5abd26b6cef26fa8820eea9b54
                      • Opcode Fuzzy Hash: 32b7e747cd8ec2ded8a9115f1ef6f478138b1009968244f12dcb29ea84e0cc9d
                      • Instruction Fuzzy Hash: 3311B2B1504204AFEB21CF55DC84BA6FBE8EF14714F08C46AEE498B651C375E5088BB2

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1255 dfb424-dfb46a 1257 dfb46f-dfb478 1255->1257 1258 dfb46c 1255->1258 1259 dfb47a-dfb49a ShellExecuteExW 1257->1259 1260 dfb4b9-dfb4be 1257->1260 1258->1257 1263 dfb49c-dfb4b8 1259->1263 1264 dfb4c0-dfb4c5 1259->1264 1260->1259 1264->1263
                      APIs
                      • ShellExecuteExW.SHELL32(?), ref: 00DFB480
                      Memory Dump Source
                      • Source File: 00000000.00000002.2049651306.0000000000DFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DFA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_dfa000_Gv10VZCeN7.jbxd
                      Similarity
                      • API ID: ExecuteShell
                      • String ID:
                      • API String ID: 587946157-0
                      • Opcode ID: 36bb1e723edda8cca413365fe1fd5576b6e4b3cee0a2cd5865901d7bb1d6a503
                      • Instruction ID: bdf89fa93e72cc9a9cffd2bbd816529722acd88644862e4b266ddc865e9c4d75
                      • Opcode Fuzzy Hash: 36bb1e723edda8cca413365fe1fd5576b6e4b3cee0a2cd5865901d7bb1d6a503
                      • Instruction Fuzzy Hash: 281160715093849FD712CF25DD94B56BFB8DF06224F0984EBED49CB253D264E908CB62
                      APIs
                      • GetFileType.KERNELBASE(?,00000E24,5E180306,00000000,00000000,00000000,00000000), ref: 00DFACBD
                      Memory Dump Source
                      • Source File: 00000000.00000002.2049651306.0000000000DFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DFA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_dfa000_Gv10VZCeN7.jbxd
                      Similarity
                      • API ID: FileType
                      • String ID:
                      • API String ID: 3081899298-0
                      • Opcode ID: a2cb505ceb0886ef43f66fe822fddac6e551cf7e5b8a0d0b7268058748e3d45a
                      • Instruction ID: 319be3206357c3d8d67c9904eed5bda6b2c864b29a3a3281a42bde458146c54c
                      • Opcode Fuzzy Hash: a2cb505ceb0886ef43f66fe822fddac6e551cf7e5b8a0d0b7268058748e3d45a
                      • Instruction Fuzzy Hash: 790122B5600204AFE720CF09CC84BB6F7A8DF14724F08C0A6EE088B741C374E9488AB2
                      APIs
                      • ShellExecuteExW.SHELL32(?), ref: 00DFB480
                      Memory Dump Source
                      • Source File: 00000000.00000002.2049651306.0000000000DFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DFA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_dfa000_Gv10VZCeN7.jbxd
                      Similarity
                      • API ID: ExecuteShell
                      • String ID:
                      • API String ID: 587946157-0
                      • Opcode ID: fe8c7596369cdb61b323818d9d0ae1d81496d60f0958247e73dad00dac6bff17
                      • Instruction ID: 82961354d7006c6dc856d51fd3f63317788efe78f24bd2e8e2413a67064a91af
                      • Opcode Fuzzy Hash: fe8c7596369cdb61b323818d9d0ae1d81496d60f0958247e73dad00dac6bff17
                      • Instruction Fuzzy Hash: 63016D716042088FDB10CF29DA84766BBE4EF04724F08C4ABDE49CB652D374E804CA62
                      APIs
                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00DFA5DE
                      Memory Dump Source
                      • Source File: 00000000.00000002.2049651306.0000000000DFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DFA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_dfa000_Gv10VZCeN7.jbxd
                      Similarity
                      • API ID: DuplicateHandle
                      • String ID:
                      • API String ID: 3793708945-0
                      • Opcode ID: 9a310187991d7945ab2d20d9c85efbc86f4421b20ed1781cc0616ee482b8fee3
                      • Instruction ID: a3797a67219ab6307ddda53cacf1614d728aae49c4b73515c0c597f133f6f424
                      • Opcode Fuzzy Hash: 9a310187991d7945ab2d20d9c85efbc86f4421b20ed1781cc0616ee482b8fee3
                      • Instruction Fuzzy Hash: 2D0161715046449FDB21CF59D944B62FFE0EF08710F08C8AADE494A651C376E414DF62
                      APIs
                      • OleGetClipboard.OLE32(?,00000E24,?,?), ref: 00DFA77E
                      Memory Dump Source
                      • Source File: 00000000.00000002.2049651306.0000000000DFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DFA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_dfa000_Gv10VZCeN7.jbxd
                      Similarity
                      • API ID: Clipboard
                      • String ID:
                      • API String ID: 220874293-0
                      • Opcode ID: c3054728ec84b2c652fd672826ace5049183af8ef70a0f22665ff8781cfa62a7
                      • Instruction ID: d0a8a6c9965fa82018eb4b57110fa1fab3965efa888efe1af37cf0f255e3d05e
                      • Opcode Fuzzy Hash: c3054728ec84b2c652fd672826ace5049183af8ef70a0f22665ff8781cfa62a7
                      • Instruction Fuzzy Hash: 32016D71A00600ABD310DF16DC86B66FBE8FB88A20F14815AED089BB41D775F955CBE6
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2049651306.0000000000DFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DFA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_dfa000_Gv10VZCeN7.jbxd
                      Similarity
                      • API ID: Initialize
                      • String ID:
                      • API String ID: 2538663250-0
                      • Opcode ID: 648c757afc9ff56e1e2ca71019eb982578e6eca7fef53d918143afba3c855cd3
                      • Instruction ID: cd8d718efc3b2f22cb13ede106664e4a1c1a1662fb25182d40512eac51fafac1
                      • Opcode Fuzzy Hash: 648c757afc9ff56e1e2ca71019eb982578e6eca7fef53d918143afba3c855cd3
                      • Instruction Fuzzy Hash: 76018FB19056449FDB20CF19D984766FBA4EF04720F0DC4AADE498F252D375E404CEA2
                      APIs
                      • SetErrorMode.KERNELBASE(?), ref: 00DFAA44
                      Memory Dump Source
                      • Source File: 00000000.00000002.2049651306.0000000000DFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DFA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_dfa000_Gv10VZCeN7.jbxd
                      Similarity
                      • API ID: ErrorMode
                      • String ID:
                      • API String ID: 2340568224-0
                      • Opcode ID: 45bc3a35beed95626c35a98eccc424abaacdacd6e64b48db60fc0f0a42d2521e
                      • Instruction ID: e25031aa11c8afae8501cae57b632c8262ca7d7345e7332b6e5a273af1352dee
                      • Opcode Fuzzy Hash: 45bc3a35beed95626c35a98eccc424abaacdacd6e64b48db60fc0f0a42d2521e
                      • Instruction Fuzzy Hash: 29F08C759046489FDB20CF19DA84762FBE0EF04724F08C0AADE494B752D279E948CEB2
                      APIs
                      • CloseHandle.KERNELBASE(?), ref: 00DFABF0
                      Memory Dump Source
                      • Source File: 00000000.00000002.2049651306.0000000000DFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DFA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_dfa000_Gv10VZCeN7.jbxd
                      Similarity
                      • API ID: CloseHandle
                      • String ID:
                      • API String ID: 2962429428-0
                      • Opcode ID: 63313cb35d3ca5bc9ded066ff01cf31b4902396e081d3ee742ab541762f3ff9a
                      • Instruction ID: 0a198b16302d52025d2ae4e483b3717dac5a5f2be0aa776183791f5007f64de5
                      • Opcode Fuzzy Hash: 63313cb35d3ca5bc9ded066ff01cf31b4902396e081d3ee742ab541762f3ff9a
                      • Instruction Fuzzy Hash: EB21B0B55093809FD7128F25DC95652BFB8EF07220F0984DADD858F2A3D2649909CB62
                      APIs
                      • CloseHandle.KERNELBASE(?), ref: 00DFABF0
                      Memory Dump Source
                      • Source File: 00000000.00000002.2049651306.0000000000DFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DFA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_dfa000_Gv10VZCeN7.jbxd
                      Similarity
                      • API ID: CloseHandle
                      • String ID:
                      • API String ID: 2962429428-0
                      • Opcode ID: f324bd330f422dbde4dbe14ff213388f0ce09f21e230cb437f0b48663fb9c544
                      • Instruction ID: 1c376cbdd5c9e9b23e20c1b017f8059f854f572bb494ade2c40eded59bd8df4b
                      • Opcode Fuzzy Hash: f324bd330f422dbde4dbe14ff213388f0ce09f21e230cb437f0b48663fb9c544
                      • Instruction Fuzzy Hash: 360184756042449FDB10CF19D985766FBE4DF05720F08C4AADE498B751D375E844CE62
                      Memory Dump Source
                      • Source File: 00000000.00000002.2050531484.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4df0000_Gv10VZCeN7.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e4826ac693cbc03c9f33b5fd01a72154da9eba727d5b8fb0a5acdd1a17d76da9
                      • Instruction ID: a3261f1ee8609d3f99ee8d1b51110ae7cd78fd11250c166cdf9fdaf274e10c46
                      • Opcode Fuzzy Hash: e4826ac693cbc03c9f33b5fd01a72154da9eba727d5b8fb0a5acdd1a17d76da9
                      • Instruction Fuzzy Hash: E2324970A01218CFCB24EF74D955BADB7B2BF49308F1045A9E509AB394DB799E81CF50
                      Memory Dump Source
                      • Source File: 00000000.00000002.2050531484.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4df0000_Gv10VZCeN7.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cb08a06e4c694b901538bfb0b9cc0f318a742d73130198e2fd43d61eb6c40426
                      • Instruction ID: 686f559b8aaf3298db2db3ef049a77064929e9a1f3e6736bf8617b455566b756
                      • Opcode Fuzzy Hash: cb08a06e4c694b901538bfb0b9cc0f318a742d73130198e2fd43d61eb6c40426
                      • Instruction Fuzzy Hash: 76818B30A01258CFDB24EFB4C851BADB7B2AF85308F1044AAE509AB394DB799D85CF51
                      Memory Dump Source
                      • Source File: 00000000.00000002.2050531484.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4df0000_Gv10VZCeN7.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1ba0bef17214785631ffd7b2466035654cfc2bd3406b9e520ce11a02cd3ce3ea
                      • Instruction ID: 52685b9cd1b81cdde94be72e85c43391f987c19928e7477a94a845a9d1bacfae
                      • Opcode Fuzzy Hash: 1ba0bef17214785631ffd7b2466035654cfc2bd3406b9e520ce11a02cd3ce3ea
                      • Instruction Fuzzy Hash: 5541A070A01218CFDB24EFB5C950BECB7B2BF45308F1140AAD445AB294DB785E85CF21
                      Memory Dump Source
                      • Source File: 00000000.00000002.2050531484.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4df0000_Gv10VZCeN7.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 898467ca552c8346ba2094cf6a3daf781807ac419ca8863f8c2b92fa9cb3f8dc
                      • Instruction ID: 8e6fab8f45513c5f0280af3d79fdb9cfb5b041ca7e41460ced7ca713d9f2f68f
                      • Opcode Fuzzy Hash: 898467ca552c8346ba2094cf6a3daf781807ac419ca8863f8c2b92fa9cb3f8dc
                      • Instruction Fuzzy Hash: 5531C530B012119FDB24BB79D811BBE37A6EB8820CF1044399605D77A9DF39ED1A87E1
                      Memory Dump Source
                      • Source File: 00000000.00000002.2050531484.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4df0000_Gv10VZCeN7.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4db9a8281c10d346d337aaa30d716ca23b4f68fc527f178b5dffba9d95423633
                      • Instruction ID: 3ae1b7b684a6f95c8d3fe045c07e6e3e476d13f597d6c6958680c82393b5ec32
                      • Opcode Fuzzy Hash: 4db9a8281c10d346d337aaa30d716ca23b4f68fc527f178b5dffba9d95423633
                      • Instruction Fuzzy Hash: 3731E532B052409FD715AB79A851BAE3BA79BC2308F1485BDE005DB2D1DF7A8C458792
                      Memory Dump Source
                      • Source File: 00000000.00000002.2050531484.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4df0000_Gv10VZCeN7.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b0ddb2eb788a50775e30406d8f0061e7e58bd535a00c571e54b55e3e08cbf074
                      • Instruction ID: 78755de54a966c49929d9bb88a9a21b753fed4b6429868abf6f9787c83ebde7d
                      • Opcode Fuzzy Hash: b0ddb2eb788a50775e30406d8f0061e7e58bd535a00c571e54b55e3e08cbf074
                      • Instruction Fuzzy Hash: A111E136B051408FC325B779B851BBA26879BC534871849BDE005DB791CFAE8C4987A2
                      Memory Dump Source
                      • Source File: 00000000.00000002.2050531484.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4df0000_Gv10VZCeN7.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ff916ab0f5d7d09cfad7f6be0ac15ec3d9d5b1d8b5b1996e1bf7cd2e56af5f4b
                      • Instruction ID: e7d63e26a4958512881056766e017dc0126dfa86e5f13d5eee19405b3cdb513e
                      • Opcode Fuzzy Hash: ff916ab0f5d7d09cfad7f6be0ac15ec3d9d5b1d8b5b1996e1bf7cd2e56af5f4b
                      • Instruction Fuzzy Hash: E31180A554F3C08FD30397346CA46813FB09F17209B8E45EBC484CA5A7E25D594ED762
                      Memory Dump Source
                      • Source File: 00000000.00000002.2050269765.00000000011E0000.00000040.00000020.00020000.00000000.sdmp, Offset: 011E0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_11e0000_Gv10VZCeN7.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c14b23d045a7b20d91ab5a90dccd865f4f0a73137c67a040f0f829ab643db07f
                      • Instruction ID: 019d34821b3752d0c7abe6c3790ab8ca762308490f17a36392662c5d68d2f243
                      • Opcode Fuzzy Hash: c14b23d045a7b20d91ab5a90dccd865f4f0a73137c67a040f0f829ab643db07f
                      • Instruction Fuzzy Hash: C3016DB65097846FD711CF06ED41862FBA8EE86630709C4ABEC498B652D225B909CB72
                      Memory Dump Source
                      • Source File: 00000000.00000002.2050531484.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4df0000_Gv10VZCeN7.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: af2de6b1ea13b33f3396dbc9d67c210740d24ba2b5855aefa9c4bcc680ba000e
                      • Instruction ID: 84337179b96ea73ea5c7fb67d172c4a2041b28745dc1dc4d629fbfc9fda0f86d
                      • Opcode Fuzzy Hash: af2de6b1ea13b33f3396dbc9d67c210740d24ba2b5855aefa9c4bcc680ba000e
                      • Instruction Fuzzy Hash: ACF02B76A00304AFDB14DF709C52BAE7FB2DF81714F1486AEE141EB1C2DA325841C740
                      Memory Dump Source
                      • Source File: 00000000.00000002.2050269765.00000000011E0000.00000040.00000020.00020000.00000000.sdmp, Offset: 011E0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_11e0000_Gv10VZCeN7.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 016b40381926af580f641c9e1946a99462a9cdbe2e60c3e5de7343c061ea99b0
                      • Instruction ID: c9e660f2cbc50e356ddff825576172637ddce1d2046e658c0e39476a4b9f73c7
                      • Opcode Fuzzy Hash: 016b40381926af580f641c9e1946a99462a9cdbe2e60c3e5de7343c061ea99b0
                      • Instruction Fuzzy Hash: 8EE092B6A046044B9650CF0AED41452F7D8EB84630708C47FDC0D8B711D235B508CEA5
                      Memory Dump Source
                      • Source File: 00000000.00000002.2050531484.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4df0000_Gv10VZCeN7.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c2d514357398d670afa304ff9b82ef5f3c1140393b90fc20de0d3e6c39e98ada
                      • Instruction ID: dd0b4137c9987b0983676e1a4c35957578d09fbecc3422b07b6eb0e5d65e509d
                      • Opcode Fuzzy Hash: c2d514357398d670afa304ff9b82ef5f3c1140393b90fc20de0d3e6c39e98ada
                      • Instruction Fuzzy Hash: 45E0123024E3809FC71A573464289983F715F4611A71804FEC54ACB6A6DA7B8446CF50
                      Memory Dump Source
                      • Source File: 00000000.00000002.2049631025.0000000000DF2000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DF2000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_df2000_Gv10VZCeN7.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b17b89cbb2fc2b627918424e84ae64f7490f630e29fd20dc2a392723803ce43a
                      • Instruction ID: c7f783edd6dc88b318a4d21092ec85c5c98cfc6e53851f2364aa7b07c4d94b18
                      • Opcode Fuzzy Hash: b17b89cbb2fc2b627918424e84ae64f7490f630e29fd20dc2a392723803ce43a
                      • Instruction Fuzzy Hash: BFD02E792006C44FD3238A0CC2A5BA537D4AB60704F0B84FAA800CB763C7A8D881C220
                      Memory Dump Source
                      • Source File: 00000000.00000002.2049631025.0000000000DF2000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DF2000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_df2000_Gv10VZCeN7.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 61235713ead99133596e2eb2f371bfb4c5bda17fc84300e6cc723773843ecddb
                      • Instruction ID: b29072057913288850d6b955b7220d10c2dab94e0b8ecc6bb24446ce49e60ed7
                      • Opcode Fuzzy Hash: 61235713ead99133596e2eb2f371bfb4c5bda17fc84300e6cc723773843ecddb
                      • Instruction Fuzzy Hash: B8D05E742006854FC725DB0CC2D4F6937D4AB40714F1A84ECAC108B762C7A9D8C5DA10
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2050531484.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4df0000_Gv10VZCeN7.jbxd
                      Similarity
                      • API ID:
                      • String ID: $|t
                      • API String ID: 0-1654681884
                      • Opcode ID: 931875aa1f1d27d95c914de2f54cf0c4d1334e030a7831f962c5b59d81d72446
                      • Instruction ID: f8b3c0d6f0297ac176118f588a6a22b2c9a85e1fbc6f0955baa5b0c023a8e2f8
                      • Opcode Fuzzy Hash: 931875aa1f1d27d95c914de2f54cf0c4d1334e030a7831f962c5b59d81d72446
                      • Instruction Fuzzy Hash: 9A032B74A02128CFDB64EB34DD54BA9B7B2FB48304F1041EAE909A73A5DB359E95CF40
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2050531484.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4df0000_Gv10VZCeN7.jbxd
                      Similarity
                      • API ID:
                      • String ID: $|t
                      • API String ID: 0-1654681884
                      • Opcode ID: 06cc121a655f5ac068cc82253e0521ca704c87f8aac13ff68e519b3aa670f805
                      • Instruction ID: 27b397f4cdeae8ff887b9ec7eafa2bb77ebb95517affecf5e56c5ce35c9ed780
                      • Opcode Fuzzy Hash: 06cc121a655f5ac068cc82253e0521ca704c87f8aac13ff68e519b3aa670f805
                      • Instruction Fuzzy Hash: 11032B74A02128CFDB64EB34DD54BA9B7B2FB48304F1041EAE909A73A5DB359E95CF40
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2050531484.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4df0000_Gv10VZCeN7.jbxd
                      Similarity
                      • API ID:
                      • String ID: $|t
                      • API String ID: 0-1654681884
                      • Opcode ID: ba2767411f97cd956db22a9951bb27e9bdfb2803af6ab03eb005268a172667cf
                      • Instruction ID: 6bf5721db3965e6840aa3392b36abe36596a4f9960181a921c3297c935c1d300
                      • Opcode Fuzzy Hash: ba2767411f97cd956db22a9951bb27e9bdfb2803af6ab03eb005268a172667cf
                      • Instruction Fuzzy Hash: 90032B74A02128CFDB64EB34DD54BA9B7B2FB48304F1041E9E909A73A5DB359E95CF40
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2050531484.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4df0000_Gv10VZCeN7.jbxd
                      Similarity
                      • API ID:
                      • String ID: $|t
                      • API String ID: 0-1654681884
                      • Opcode ID: 82afb7a215eb3ccdc65d0b63a628dd0505128019529c1d9c481f82038fad5245
                      • Instruction ID: 7d9500aac58d77f06f569502d0a7c4b193aa1113a4f5e86718827c39f1cd62ae
                      • Opcode Fuzzy Hash: 82afb7a215eb3ccdc65d0b63a628dd0505128019529c1d9c481f82038fad5245
                      • Instruction Fuzzy Hash: E2F22B74A02128CFDB64EB34DD54BA9B7B2FB48304F1041EAE909A73A5DB359E95CF40
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2050531484.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4df0000_Gv10VZCeN7.jbxd
                      Similarity
                      • API ID:
                      • String ID: $|t
                      • API String ID: 0-1654681884
                      • Opcode ID: 6bfe550d11c0a37f175079111b853f483499f5325826726d02e1ef2c1074b051
                      • Instruction ID: 1011c0e1e66babad799ff7d675455cd7402c6a30ede8f4e700771ab663dbfbfd
                      • Opcode Fuzzy Hash: 6bfe550d11c0a37f175079111b853f483499f5325826726d02e1ef2c1074b051
                      • Instruction Fuzzy Hash: A9F22B74A02128CFDB64EB34DD54BA9B7B2FB48304F1041EAE909A73A5DB359E95CF40
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2050531484.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4df0000_Gv10VZCeN7.jbxd
                      Similarity
                      • API ID:
                      • String ID: $|t
                      • API String ID: 0-1654681884
                      • Opcode ID: 891a44d0cb15a208e6d90528d81e1452394f430ae59cb26f279f0565bfdeb325
                      • Instruction ID: 830e0c7ed67fbb45f871a5cca4c156f2886512b9eaf5474471c29ee14eb042f8
                      • Opcode Fuzzy Hash: 891a44d0cb15a208e6d90528d81e1452394f430ae59cb26f279f0565bfdeb325
                      • Instruction Fuzzy Hash: F6F23B74A02128CFDB64EB34DD54BA9B7B2FB48304F1041EAE909A73A5DB359E95CF40
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2050531484.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4df0000_Gv10VZCeN7.jbxd
                      Similarity
                      • API ID:
                      • String ID: $|t
                      • API String ID: 0-1654681884
                      • Opcode ID: 99c254fd39fa243dcf04425e020788e97290e6af50ed9d3bcfc551437a3b2113
                      • Instruction ID: f93f4438170133b69183d2b1c1143748e1462d49c98e2fd3945f0feba867fbcf
                      • Opcode Fuzzy Hash: 99c254fd39fa243dcf04425e020788e97290e6af50ed9d3bcfc551437a3b2113
                      • Instruction Fuzzy Hash: E8F23B74A02128CFDB64EB34DD54BA9B7B2FB48304F1041EAE909A73A5DB359E95CF40
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2050531484.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4df0000_Gv10VZCeN7.jbxd
                      Similarity
                      • API ID:
                      • String ID: $|t
                      • API String ID: 0-1654681884
                      • Opcode ID: db152a83997c36e9c3fa6ab064e049f997dddbe76f646c4234115b9ee9b6ae96
                      • Instruction ID: 10741c42eeeb912e07f032ccd36260057fdce70ce174118445c416a8776a5153
                      • Opcode Fuzzy Hash: db152a83997c36e9c3fa6ab064e049f997dddbe76f646c4234115b9ee9b6ae96
                      • Instruction Fuzzy Hash: 9EF23B74A02128CFDB64EB34DD54BA9B7B2FB48304F1041EAE909A73A5DB359E95CF40
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2050531484.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4df0000_Gv10VZCeN7.jbxd
                      Similarity
                      • API ID:
                      • String ID: $|t
                      • API String ID: 0-1654681884
                      • Opcode ID: 7bdcc77f558f99368c2ab964913ba94d71dc45db41180da3db49d125f6b96065
                      • Instruction ID: 447f7158b85fe6ccfd358e9c7809eae75030a05b225e10ab6562ce90cb4d2f43
                      • Opcode Fuzzy Hash: 7bdcc77f558f99368c2ab964913ba94d71dc45db41180da3db49d125f6b96065
                      • Instruction Fuzzy Hash: DCE24B74A02128CFDB64EB34DD54BA9B7B2FB48304F1041EAE909A73A5DB359E95CF40
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2050531484.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4df0000_Gv10VZCeN7.jbxd
                      Similarity
                      • API ID:
                      • String ID: |t
                      • API String ID: 0-1785604035
                      • Opcode ID: deea6961ab9ef03780b666263825e65b7cf46b85be8e1b77845552205cfe89ed
                      • Instruction ID: 009efa39993c2eddd65670c0f914a463a57396f5ca7ef6066beadd5320ea2fcc
                      • Opcode Fuzzy Hash: deea6961ab9ef03780b666263825e65b7cf46b85be8e1b77845552205cfe89ed
                      • Instruction Fuzzy Hash: 77E23B74A02128CFDB64EB34DD54BA9B7B2FB48304F1041EAE909A73A5DB359E95CF40
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2050531484.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4df0000_Gv10VZCeN7.jbxd
                      Similarity
                      • API ID:
                      • String ID: |t
                      • API String ID: 0-1785604035
                      • Opcode ID: 83070e973502d1ba36b2317dfcccdde20818fdb73fc6fdc9a634fd4421a30fcb
                      • Instruction ID: 2e452d4bed2e8fb80b76856686cc23f0f70fff7f9b2acfc93844554d0ec3cc23
                      • Opcode Fuzzy Hash: 83070e973502d1ba36b2317dfcccdde20818fdb73fc6fdc9a634fd4421a30fcb
                      • Instruction Fuzzy Hash: 6BD23C74A02228CFDB65EF34DD54BA9B7B2BB48304F1041E9E909A73A5DB359E85CF40
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2050531484.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4df0000_Gv10VZCeN7.jbxd
                      Similarity
                      • API ID:
                      • String ID: |t
                      • API String ID: 0-1785604035
                      • Opcode ID: 6079d5e026b2525412d818ef3dc96768018c208a58b6d97a3f57fea736b97a99
                      • Instruction ID: be473c8152d9565738bcff32ef7507b793cc976068dc025a1ca11b824fab6501
                      • Opcode Fuzzy Hash: 6079d5e026b2525412d818ef3dc96768018c208a58b6d97a3f57fea736b97a99
                      • Instruction Fuzzy Hash: 1FD23B74A02228CFDB65EF34DD54BA9B7B2BB48304F1041E9E909A73A5DB359E85CF40
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2050531484.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4df0000_Gv10VZCeN7.jbxd
                      Similarity
                      • API ID:
                      • String ID: |t
                      • API String ID: 0-1785604035
                      • Opcode ID: a8f0005b2449b0a491c60e3947416008f20d2bb73912f1d2948309b47d7eb379
                      • Instruction ID: 645033311892292979da3fdb7539f1352deb23c6d1d92850f9e1c8d4264f5506
                      • Opcode Fuzzy Hash: a8f0005b2449b0a491c60e3947416008f20d2bb73912f1d2948309b47d7eb379
                      • Instruction Fuzzy Hash: 17D23B74A02228CFDB65EF34DD54BA9B7B2BB48304F1041E9E909A73A5DB359E85CF40
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2050531484.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4df0000_Gv10VZCeN7.jbxd
                      Similarity
                      • API ID:
                      • String ID: |t
                      • API String ID: 0-1785604035
                      • Opcode ID: 622712384021d6212330ec06ae6469f60dacad2bb53fac11f3cc399a80750881
                      • Instruction ID: 7d87732fc281618c599dedd9805b6085404719924c7a2b603c4941fa3dd43155
                      • Opcode Fuzzy Hash: 622712384021d6212330ec06ae6469f60dacad2bb53fac11f3cc399a80750881
                      • Instruction Fuzzy Hash: E6D23B74A02228CFDB65EB34DD54BA9B7B2BB48304F1041E9E909A73A5DB359E85CF40
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2050531484.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4df0000_Gv10VZCeN7.jbxd
                      Similarity
                      • API ID:
                      • String ID: |t
                      • API String ID: 0-1785604035
                      • Opcode ID: 9b0f338e40f13e745acb048aa45f76584085e84d79589a81e4b8a46b252f048f
                      • Instruction ID: 40d6d4aeb6f0075c1f4c8c7b8a3d4567bb6168b52a48ff98c83477a705fa8970
                      • Opcode Fuzzy Hash: 9b0f338e40f13e745acb048aa45f76584085e84d79589a81e4b8a46b252f048f
                      • Instruction Fuzzy Hash: 18D23B74A02228CFDB65EB34DD54BA9B7B2BB48304F1041E9E909A73A5DB359E85CF40
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2050531484.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4df0000_Gv10VZCeN7.jbxd
                      Similarity
                      • API ID:
                      • String ID: |t
                      • API String ID: 0-1785604035
                      • Opcode ID: 38f804b3e7abcb0e8ddb76035b9c4ebb3878924fe0d372d5b0e5f78385f67b10
                      • Instruction ID: 06c34eda087a1eedbda63a989ca8019bfaaec11b301cff63de6396505d29ce98
                      • Opcode Fuzzy Hash: 38f804b3e7abcb0e8ddb76035b9c4ebb3878924fe0d372d5b0e5f78385f67b10
                      • Instruction Fuzzy Hash: 7EC21D74A02228CFDB65EF24DD54BA9B7B2FB48304F1041E9E909AB395DB359E91CF40
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2050531484.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4df0000_Gv10VZCeN7.jbxd
                      Similarity
                      • API ID:
                      • String ID: N$N$N$N
                      • API String ID: 0-91100018
                      • Opcode ID: 50f324b3af9f0ff77a927eee23093d30fe982718ece2c936735fa549d8ef84b2
                      • Instruction ID: a622743aa5f5c4099278136d8e1cfcc1749cff732d7b9c96d0b0a903aec2f85b
                      • Opcode Fuzzy Hash: 50f324b3af9f0ff77a927eee23093d30fe982718ece2c936735fa549d8ef84b2
                      • Instruction Fuzzy Hash: 96214B747006599FEB20DF69C841BAA73E9FF89304F154469EA06EB794EB70FC058B90

                      Execution Graph

                      Execution Coverage:39.9%
                      Dynamic/Decrypted Code Coverage:100%
                      Signature Coverage:8.9%
                      Total number of Nodes:112
                      Total number of Limit Nodes:7
                      execution_graph 20523 4d20bd2 20524 4d20c0a RegCreateKeyExW 20523->20524 20526 4d20c7c 20524->20526 20527 4d23252 20530 4d23287 SetProcessWorkingSetSize 20527->20530 20529 4d232b3 20530->20529 20531 4d21b52 20532 4d21b8a ConvertStringSecurityDescriptorToSecurityDescriptorW 20531->20532 20534 4d21bcb 20532->20534 20535 cdb8ce 20536 cdb8f4 DeleteFileW 20535->20536 20538 cdb910 20536->20538 20539 cdbace 20540 cdbb2c 20539->20540 20541 cdbafa FindClose 20539->20541 20540->20541 20542 cdbb0f 20541->20542 20614 4d2309a 20615 4d230c3 select 20614->20615 20617 4d230f8 20615->20617 20543 cdb746 20544 cdb76f CopyFileW 20543->20544 20546 cdb796 20544->20546 20618 cda186 20619 cda1bb send 20618->20619 20620 cda1f3 20618->20620 20621 cda1c9 20619->20621 20620->20619 20622 cdb982 20623 cdb9ab SetFileAttributesW 20622->20623 20625 cdb9c7 20623->20625 20547 4d211c2 20550 4d211f7 GetExitCodeProcess 20547->20550 20549 4d21220 20550->20549 20626 4d21d02 20627 4d21d3a MapViewOfFile 20626->20627 20629 4d21d89 20627->20629 20630 cdb69e 20631 cdb6cd WaitForInputIdle 20630->20631 20632 cdb703 20630->20632 20633 cdb6db 20631->20633 20632->20631 20634 cda51e 20635 cda54a CloseHandle 20634->20635 20637 cda580 20634->20637 20636 cda558 20635->20636 20637->20635 20551 4d22346 20552 4d2237b WSAConnect 20551->20552 20554 4d2239a 20552->20554 20555 cdb45a 20556 cdb495 SendMessageTimeoutA 20555->20556 20558 cdb4dd 20556->20558 20559 cda45a 20560 cda498 DuplicateHandle 20559->20560 20561 cda4d0 20559->20561 20562 cda4a6 20560->20562 20561->20560 20641 cdaa12 20642 cdaa3e SetErrorMode 20641->20642 20643 cdaa67 20641->20643 20644 cdaa53 20642->20644 20643->20642 20563 4d225f2 20566 4d2262d LoadLibraryA 20563->20566 20565 4d2266a 20566->20565 20567 cdadee 20570 cdae23 WriteFile 20567->20570 20569 cdae55 20570->20569 20571 cda5ee 20572 cda63e GetUserNameW 20571->20572 20573 cda64c 20572->20573 20574 4d22176 20576 4d221ab GetProcessTimes 20574->20576 20577 4d221dd 20576->20577 20578 cdac6a 20580 cdac9f GetFileType 20578->20580 20581 cdaccc 20580->20581 20645 cdafaa 20646 cdafe2 CreateMutexW 20645->20646 20648 cdb025 20646->20648 20649 cdbda6 20650 cdbdd5 AdjustTokenPrivileges 20649->20650 20652 cdbdf7 20650->20652 20653 cdaaa6 20655 cdaade CreateFileW 20653->20655 20656 cdab2d 20655->20656 20657 cdbc26 20658 cdbc4f LookupPrivilegeValueW 20657->20658 20660 cdbc76 20658->20660 20586 4d200fe 20588 4d2012a K32EnumProcesses 20586->20588 20589 4d20146 20588->20589 20661 4d22fbe 20662 4d22ff3 ioctlsocket 20661->20662 20664 4d2301f 20662->20664 20665 cdbf22 20666 cdbf57 NtQuerySystemInformation 20665->20666 20667 cdbf82 20665->20667 20668 cdbf6c 20666->20668 20667->20666 20590 cdb27e 20591 cdb2b3 RegQueryValueExW 20590->20591 20593 cdb307 20591->20593 20673 4d21fa6 20674 4d21fdb shutdown 20673->20674 20676 4d22004 20674->20676 20677 4d21726 20679 4d2175e WSASocketW 20677->20679 20680 4d2179a 20679->20680 20602 cdb176 20603 cdb1ae RegOpenKeyExW 20602->20603 20605 cdb204 20603->20605 20606 4d2316e 20607 4d231a3 GetProcessWorkingSetSize 20606->20607 20609 4d231cf 20607->20609 20610 cdb372 20611 cdb3a7 RegSetValueExW 20610->20611 20613 cdb3f3 20611->20613
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480586343.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4ec0000_server.jbxd
                      Similarity
                      • API ID:
                      • String ID: @
                      • API String ID: 0-2766056989
                      • Opcode ID: 03dacfbb7847cf851fe0d9355633a917a97c5443fd7bb257317b1df7bfaf44d3
                      • Instruction ID: fc015ea566db6df488d25ad49c89fd6f27f53fb81503eb4c4c2b0645777f693f
                      • Opcode Fuzzy Hash: 03dacfbb7847cf851fe0d9355633a917a97c5443fd7bb257317b1df7bfaf44d3
                      • Instruction Fuzzy Hash: 87235C75A012688FDB24EF34C954BADB7B2FB58308F1081E9D909673A5DB35AE81CF50
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480586343.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4ec0000_server.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID: 0-3916222277
                      • Opcode ID: 7df670d5219d32e1235048357c6d3a3219a0c4735a629db08c0904b035aa5cb9
                      • Instruction ID: d355f81776ba8c07fcc7ee8acd3ae4a2b1067db24dc913e6e3149c18a12d8a08
                      • Opcode Fuzzy Hash: 7df670d5219d32e1235048357c6d3a3219a0c4735a629db08c0904b035aa5cb9
                      • Instruction Fuzzy Hash: 7A135B75A012688FDB24EF34C994BADB7B2FB58308F1081E9D909673A5DB356E81CF50
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480586343.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4ec0000_server.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID: 0-3916222277
                      • Opcode ID: d33adc8bd55eda4312bf57c442399868c2a8367d7fab7f528e4bd101fd59ceb0
                      • Instruction ID: 2090681c2829494c925e782b87b7542555c1a31e9bf4065653aaeb9afab66de4
                      • Opcode Fuzzy Hash: d33adc8bd55eda4312bf57c442399868c2a8367d7fab7f528e4bd101fd59ceb0
                      • Instruction Fuzzy Hash: 2B034A75A012688FDB24EF34D994BADB7B2FB58308F0081E9D909673A5DB356E81CF50
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480586343.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4ec0000_server.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID: 0-3916222277
                      • Opcode ID: e6739d9db2d7094d7cc5c45d41d8e95fc69eba3799caa5d74eaf2b9314de2662
                      • Instruction ID: cf7aca184df033c26af00f052fa4369634a9991a4edf6797d53f17c654b825cc
                      • Opcode Fuzzy Hash: e6739d9db2d7094d7cc5c45d41d8e95fc69eba3799caa5d74eaf2b9314de2662
                      • Instruction Fuzzy Hash: 1F034A75A012688FDB24EF34D994BADB7B2FB58308F0081E9D909673A5DB356E81CF50
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480586343.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4ec0000_server.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID: 0-3916222277
                      • Opcode ID: 39568ea8bc53013a47c8b382cdfcf71817f98a9654c0fcaed63392851fac0c04
                      • Instruction ID: 4c4e59401872e554e088929b235e140984c026cec3c8458b91efe54a6ed32b07
                      • Opcode Fuzzy Hash: 39568ea8bc53013a47c8b382cdfcf71817f98a9654c0fcaed63392851fac0c04
                      • Instruction Fuzzy Hash: 2BF25A75A012688FDB25EF34C994BADB7B2FB58308F0081E9D909673A5DB356E81CF50

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 4202 4ec499d-4ec49ea 4209 4ec49ec-4ec49f7 4202->4209 4210 4ec4a32-4ec4a46 4202->4210 4209->4210 4211 4ec4a4c-4ec4b51 4210->4211 4212 4ec4b94-4ec4ba8 4210->4212 4415 4ec4b59 4211->4415 4213 4ec4bae-4ec4bc2 4212->4213 4214 4ec4cd4-4ec4ce8 4212->4214 4219 4ec4bc4-4ec4bcb 4213->4219 4220 4ec4bd0-4ec4be4 4213->4220 4217 4ec4cee-4ec4f22 4214->4217 4218 4ec4f74-4ec4f88 4214->4218 4668 4ec4f2d 4217->4668 4222 4ec4f8a-4ec4f91 4218->4222 4223 4ec4fe2-4ec4ff6 4218->4223 4221 4ec4c48-4ec4c5c 4219->4221 4224 4ec4bef-4ec4c03 4220->4224 4225 4ec4be6-4ec4bed 4220->4225 4228 4ec4c5e-4ec4c74 4221->4228 4229 4ec4c76-4ec4c82 4221->4229 4249 4ec4f9b 4222->4249 4232 4ec4ff8 4223->4232 4233 4ec5045-4ec5059 4223->4233 4226 4ec4c0e-4ec4c22 4224->4226 4227 4ec4c05-4ec4c0c 4224->4227 4225->4221 4236 4ec4c2d-4ec4c41 4226->4236 4237 4ec4c24-4ec4c2b 4226->4237 4227->4221 4238 4ec4c8d 4228->4238 4229->4238 4676 4ec4ff8 call 10d0606 4232->4676 4677 4ec4ff8 call 4ec7310 4232->4677 4678 4ec4ff8 call 4ec7461 4232->4678 4679 4ec4ff8 call 10d05e0 4232->4679 4234 4ec505b 4233->4234 4235 4ec50a2-4ec50b6 4233->4235 4234->4235 4240 4ec512d-4ec5141 4235->4240 4241 4ec50b8-4ec50e1 4235->4241 4236->4221 4243 4ec4c43-4ec4c45 4236->4243 4237->4221 4238->4214 4247 4ec53b4-4ec53c8 4240->4247 4248 4ec5147-4ec5363 4240->4248 4241->4240 4243->4221 4246 4ec4ffe 4246->4233 4250 4ec549e-4ec54b2 4247->4250 4251 4ec53ce-4ec53de 4247->4251 4615 4ec5365 4248->4615 4616 4ec5367 4248->4616 4249->4223 4255 4ec566f-4ec5683 4250->4255 4256 4ec54b8-4ec55e7 4250->4256 4681 4ec53e4 call 10d0606 4251->4681 4682 4ec53e4 call 10d05e0 4251->4682 4260 4ec5689-4ec5794 4255->4260 4261 4ec57e6-4ec57fa 4255->4261 4586 4ec55f2-4ec5628 4256->4586 4532 4ec579f 4260->4532 4265 4ec595d-4ec5971 4261->4265 4266 4ec5800-4ec590b 4261->4266 4269 4ec5ad4-4ec5ae8 4265->4269 4270 4ec5977-4ec5a82 4265->4270 4550 4ec5916 4266->4550 4276 4ec5aee-4ec5bf9 4269->4276 4277 4ec5c4b-4ec5c5f 4269->4277 4556 4ec5a8d 4270->4556 4271 4ec53ea-4ec5450 4351 4ec5457 4271->4351 4572 4ec5c04 4276->4572 4283 4ec5c65-4ec5d70 4277->4283 4284 4ec5dc2-4ec5dd6 4277->4284 4580 4ec5d7b 4283->4580 4291 4ec5ddc-4ec5ee7 4284->4291 4292 4ec5f39-4ec5f4d 4284->4292 4592 4ec5ef2 4291->4592 4298 4ec60b0-4ec60c4 4292->4298 4299 4ec5f53-4ec6069 4292->4299 4302 4ec60ca-4ec61d5 4298->4302 4303 4ec6227-4ec623b 4298->4303 4299->4298 4613 4ec61e0 4302->4613 4309 4ec639e-4ec63b2 4303->4309 4310 4ec6241-4ec634c 4303->4310 4317 4ec63b8-4ec63fd call 4ec4278 4309->4317 4318 4ec6536-4ec654a 4309->4318 4621 4ec6357 4310->4621 4444 4ec64bd-4ec64df 4317->4444 4329 4ec668d-4ec66a1 4318->4329 4330 4ec6550-4ec656f 4318->4330 4341 4ec67ee-4ec6802 4329->4341 4342 4ec66a7-4ec67a7 4329->4342 4363 4ec6614-4ec6636 4330->4363 4347 4ec694f-4ec6963 4341->4347 4348 4ec6808-4ec6908 4341->4348 4342->4341 4356 4ec6969-4ec6a69 4347->4356 4357 4ec6ab0-4ec6ada 4347->4357 4348->4347 4351->4250 4356->4357 4387 4ec6b9a-4ec6bae 4357->4387 4388 4ec6ae0-4ec6b53 4357->4388 4372 4ec663c 4363->4372 4373 4ec6574-4ec6583 4363->4373 4372->4329 4384 4ec663e 4373->4384 4385 4ec6589-4ec658d 4373->4385 4406 4ec6643-4ec668b 4384->4406 4411 4ec6598-4ec65bc 4385->4411 4392 4ec6c8b-4ec6c9f 4387->4392 4393 4ec6bb4-4ec6c0b 4387->4393 4388->4387 4409 4ec6de5-4ec6df9 4392->4409 4410 4ec6ca5-4ec6d97 4392->4410 4524 4ec6c12-4ec6c44 4393->4524 4406->4329 4421 4ec705c-4ec7070 4409->4421 4422 4ec6dff-4ec6e4f 4409->4422 4648 4ec6d9e 4410->4648 4478 4ec65be-4ec65f8 4411->4478 4479 4ec6603-4ec660c 4411->4479 4415->4212 4431 4ec7158-4ec715f 4421->4431 4432 4ec7076-4ec7111 call 4ec4278 * 2 4421->4432 4533 4ec6ebd-4ec6ee8 4422->4533 4534 4ec6e51-4ec6e77 4422->4534 4432->4431 4455 4ec64e5 4444->4455 4456 4ec6402-4ec6411 4444->4456 4455->4318 4476 4ec64e7 4456->4476 4477 4ec6417-4ec64b5 4456->4477 4499 4ec64ec-4ec6534 4476->4499 4477->4499 4608 4ec64b7 4477->4608 4478->4479 4479->4406 4480 4ec660e 4479->4480 4480->4363 4499->4318 4524->4392 4532->4261 4609 4ec6eee-4ec6fc1 4533->4609 4610 4ec6fc6-4ec7057 4533->4610 4611 4ec6eb8 4534->4611 4612 4ec6e79-4ec6e99 4534->4612 4550->4265 4556->4269 4572->4277 4580->4284 4586->4255 4592->4292 4608->4444 4609->4421 4610->4421 4611->4421 4612->4611 4613->4303 4617 4ec536d 4615->4617 4616->4617 4680 4ec5367 call 4ec74e0 4616->4680 4617->4247 4621->4309 4648->4409 4668->4218 4676->4246 4677->4246 4678->4246 4679->4246 4680->4617 4681->4271 4682->4271
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480586343.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4ec0000_server.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID: 0-3916222277
                      • Opcode ID: 3e24155bc54255bbc5a4c48f4f9fb1a836bbe7017b79efc245a342ae64c12bed
                      • Instruction ID: 3e6248cb97eb77995905434314a431089517d39a3645e21cce68a4c14e38bda0
                      • Opcode Fuzzy Hash: 3e24155bc54255bbc5a4c48f4f9fb1a836bbe7017b79efc245a342ae64c12bed
                      • Instruction Fuzzy Hash: A4F25B75A012688FDB25EF34C994BADB7B2FB58308F0081E9D909673A5DB356E81CF50

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 4683 4ec49f9-4ec4a46 4690 4ec4a4c-4ec4b51 4683->4690 4691 4ec4b94-4ec4ba8 4683->4691 4893 4ec4b59 4690->4893 4692 4ec4bae-4ec4bc2 4691->4692 4693 4ec4cd4-4ec4ce8 4691->4693 4697 4ec4bc4-4ec4bcb 4692->4697 4698 4ec4bd0-4ec4be4 4692->4698 4695 4ec4cee-4ec4f22 4693->4695 4696 4ec4f74-4ec4f88 4693->4696 5146 4ec4f2d 4695->5146 4700 4ec4f8a-4ec4f91 4696->4700 4701 4ec4fe2-4ec4ff6 4696->4701 4699 4ec4c48-4ec4c5c 4697->4699 4702 4ec4bef-4ec4c03 4698->4702 4703 4ec4be6-4ec4bed 4698->4703 4706 4ec4c5e-4ec4c74 4699->4706 4707 4ec4c76-4ec4c82 4699->4707 4727 4ec4f9b 4700->4727 4710 4ec4ff8 4701->4710 4711 4ec5045-4ec5059 4701->4711 4704 4ec4c0e-4ec4c22 4702->4704 4705 4ec4c05-4ec4c0c 4702->4705 4703->4699 4714 4ec4c2d-4ec4c41 4704->4714 4715 4ec4c24-4ec4c2b 4704->4715 4705->4699 4716 4ec4c8d 4706->4716 4707->4716 5154 4ec4ff8 call 10d0606 4710->5154 5155 4ec4ff8 call 4ec7310 4710->5155 5156 4ec4ff8 call 4ec7461 4710->5156 5157 4ec4ff8 call 10d05e0 4710->5157 4712 4ec505b 4711->4712 4713 4ec50a2-4ec50b6 4711->4713 4712->4713 4718 4ec512d-4ec5141 4713->4718 4719 4ec50b8-4ec50e1 4713->4719 4714->4699 4721 4ec4c43-4ec4c45 4714->4721 4715->4699 4716->4693 4725 4ec53b4-4ec53c8 4718->4725 4726 4ec5147-4ec5363 4718->4726 4719->4718 4721->4699 4724 4ec4ffe 4724->4711 4728 4ec549e-4ec54b2 4725->4728 4729 4ec53ce-4ec53de 4725->4729 5093 4ec5365 4726->5093 5094 4ec5367 4726->5094 4727->4701 4733 4ec566f-4ec5683 4728->4733 4734 4ec54b8-4ec55e7 4728->4734 5159 4ec53e4 call 10d0606 4729->5159 5160 4ec53e4 call 10d05e0 4729->5160 4738 4ec5689-4ec5794 4733->4738 4739 4ec57e6-4ec57fa 4733->4739 5064 4ec55f2-4ec5628 4734->5064 5010 4ec579f 4738->5010 4743 4ec595d-4ec5971 4739->4743 4744 4ec5800-4ec590b 4739->4744 4747 4ec5ad4-4ec5ae8 4743->4747 4748 4ec5977-4ec5a82 4743->4748 5028 4ec5916 4744->5028 4754 4ec5aee-4ec5bf9 4747->4754 4755 4ec5c4b-4ec5c5f 4747->4755 5034 4ec5a8d 4748->5034 4749 4ec53ea-4ec5450 4829 4ec5457 4749->4829 5050 4ec5c04 4754->5050 4761 4ec5c65-4ec5d70 4755->4761 4762 4ec5dc2-4ec5dd6 4755->4762 5058 4ec5d7b 4761->5058 4769 4ec5ddc-4ec5ee7 4762->4769 4770 4ec5f39-4ec5f4d 4762->4770 5070 4ec5ef2 4769->5070 4776 4ec60b0-4ec60c4 4770->4776 4777 4ec5f53-4ec6069 4770->4777 4780 4ec60ca-4ec61d5 4776->4780 4781 4ec6227-4ec623b 4776->4781 4777->4776 5091 4ec61e0 4780->5091 4787 4ec639e-4ec63b2 4781->4787 4788 4ec6241-4ec634c 4781->4788 4795 4ec63b8-4ec63fd call 4ec4278 4787->4795 4796 4ec6536-4ec654a 4787->4796 5099 4ec6357 4788->5099 4922 4ec64bd-4ec64df 4795->4922 4807 4ec668d-4ec66a1 4796->4807 4808 4ec6550-4ec656f 4796->4808 4819 4ec67ee-4ec6802 4807->4819 4820 4ec66a7-4ec67a7 4807->4820 4841 4ec6614-4ec6636 4808->4841 4825 4ec694f-4ec6963 4819->4825 4826 4ec6808-4ec6908 4819->4826 4820->4819 4834 4ec6969-4ec6a69 4825->4834 4835 4ec6ab0-4ec6ada 4825->4835 4826->4825 4829->4728 4834->4835 4865 4ec6b9a-4ec6bae 4835->4865 4866 4ec6ae0-4ec6b53 4835->4866 4850 4ec663c 4841->4850 4851 4ec6574-4ec6583 4841->4851 4850->4807 4862 4ec663e 4851->4862 4863 4ec6589-4ec658d 4851->4863 4884 4ec6643-4ec668b 4862->4884 4889 4ec6598-4ec65bc 4863->4889 4870 4ec6c8b-4ec6c9f 4865->4870 4871 4ec6bb4-4ec6c0b 4865->4871 4866->4865 4887 4ec6de5-4ec6df9 4870->4887 4888 4ec6ca5-4ec6d97 4870->4888 5002 4ec6c12-4ec6c44 4871->5002 4884->4807 4899 4ec705c-4ec7070 4887->4899 4900 4ec6dff-4ec6e4f 4887->4900 5126 4ec6d9e 4888->5126 4956 4ec65be-4ec65f8 4889->4956 4957 4ec6603-4ec660c 4889->4957 4893->4691 4909 4ec7158-4ec715f 4899->4909 4910 4ec7076-4ec7111 call 4ec4278 * 2 4899->4910 5011 4ec6ebd-4ec6ee8 4900->5011 5012 4ec6e51-4ec6e77 4900->5012 4910->4909 4933 4ec64e5 4922->4933 4934 4ec6402-4ec6411 4922->4934 4933->4796 4954 4ec64e7 4934->4954 4955 4ec6417-4ec64b5 4934->4955 4977 4ec64ec-4ec6534 4954->4977 4955->4977 5086 4ec64b7 4955->5086 4956->4957 4957->4884 4958 4ec660e 4957->4958 4958->4841 4977->4796 5002->4870 5010->4739 5087 4ec6eee-4ec6fc1 5011->5087 5088 4ec6fc6-4ec7057 5011->5088 5089 4ec6eb8 5012->5089 5090 4ec6e79-4ec6e99 5012->5090 5028->4743 5034->4747 5050->4755 5058->4762 5064->4733 5070->4770 5086->4922 5087->4899 5088->4899 5089->4899 5090->5089 5091->4781 5095 4ec536d 5093->5095 5094->5095 5158 4ec5367 call 4ec74e0 5094->5158 5095->4725 5099->4787 5126->4887 5146->4696 5154->4724 5155->4724 5156->4724 5157->4724 5158->5095 5159->4749 5160->4749
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480586343.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4ec0000_server.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID: 0-3916222277
                      • Opcode ID: 4e3996e7c1dab372b29e8d5491047a63f7c05b096f5ad6afa2d0a92ea4ad0f2b
                      • Instruction ID: 454c9b5f898b9eab1d4100d64a368204e91ce3d1fffc357e8d7a8f7cc41b5e62
                      • Opcode Fuzzy Hash: 4e3996e7c1dab372b29e8d5491047a63f7c05b096f5ad6afa2d0a92ea4ad0f2b
                      • Instruction Fuzzy Hash: B6F25B75A012688FDB25EF34C994BADB7B2FB58308F0081E9D909673A5DB356E81CF50
                      APIs
                      • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 00CDBDEF
                      Memory Dump Source
                      • Source File: 00000002.00000002.4478337591.0000000000CDA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_cda000_server.jbxd
                      Similarity
                      • API ID: AdjustPrivilegesToken
                      • String ID:
                      • API String ID: 2874748243-0
                      • Opcode ID: 285301d85270a538d9021a38e73b526caf88035e0fe18644b358cb1a8bd92821
                      • Instruction ID: 1cc213ce383b4782b5c47c189d7cb5f9c84c8e9aa2593e500f1492f787f8c652
                      • Opcode Fuzzy Hash: 285301d85270a538d9021a38e73b526caf88035e0fe18644b358cb1a8bd92821
                      • Instruction Fuzzy Hash: B421B1755097809FDB128F25DC44B92BFB4EF06310F09849AEA858B663D371D908DB62
                      APIs
                      • NtQuerySystemInformation.NTDLL(?,?,?,?), ref: 00CDBF5D
                      Memory Dump Source
                      • Source File: 00000002.00000002.4478337591.0000000000CDA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_cda000_server.jbxd
                      Similarity
                      • API ID: InformationQuerySystem
                      • String ID:
                      • API String ID: 3562636166-0
                      • Opcode ID: 369e89f7b74efcb6eeb7924415cc5656688d43e25facd90b766180eca98fb90a
                      • Instruction ID: 5b504e0d990148938cdd6a392828c514fe8d1529d6f889f646269e3e2b6820ba
                      • Opcode Fuzzy Hash: 369e89f7b74efcb6eeb7924415cc5656688d43e25facd90b766180eca98fb90a
                      • Instruction Fuzzy Hash: 9B1190754097C09FDB228F14DC45A92FFB4EF16314F0984DBEA848B263D275A918DB62
                      APIs
                      • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 00CDBDEF
                      Memory Dump Source
                      • Source File: 00000002.00000002.4478337591.0000000000CDA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_cda000_server.jbxd
                      Similarity
                      • API ID: AdjustPrivilegesToken
                      • String ID:
                      • API String ID: 2874748243-0
                      • Opcode ID: 4a2891f26e123c8248371bb68af288ec4fc61a747891cee086c3599fcb5a4cb2
                      • Instruction ID: e3b5afd938d93ddf4b6631e535be7b46a4eda5ce2fab12c203cf466494ae1e6a
                      • Opcode Fuzzy Hash: 4a2891f26e123c8248371bb68af288ec4fc61a747891cee086c3599fcb5a4cb2
                      • Instruction Fuzzy Hash: 73114C75600604DFDB20CF66D984BA6BBE4EF04320F08886AEE458BB51D375E918DB62
                      APIs
                      • GetUserNameW.ADVAPI32(?,00000E24,?,?), ref: 00CDA63E
                      Memory Dump Source
                      • Source File: 00000002.00000002.4478337591.0000000000CDA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_cda000_server.jbxd
                      Similarity
                      • API ID: NameUser
                      • String ID:
                      • API String ID: 2645101109-0
                      • Opcode ID: 5b8f04660b9f2d6e85e7a7461678b7fb68ee4db72d7534cd1130ce7cf5885b39
                      • Instruction ID: a08d040790221c10a6b1a8b5ee90386cf4e9d88658668ac53167b3bfc123ef49
                      • Opcode Fuzzy Hash: 5b8f04660b9f2d6e85e7a7461678b7fb68ee4db72d7534cd1130ce7cf5885b39
                      • Instruction Fuzzy Hash: 8401D171600200ABD310DF16CC86B76FBE8FB88A20F14815AED089BB41E771F915CBE6
                      APIs
                      • NtQuerySystemInformation.NTDLL(?,?,?,?), ref: 00CDBF5D
                      Memory Dump Source
                      • Source File: 00000002.00000002.4478337591.0000000000CDA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_cda000_server.jbxd
                      Similarity
                      • API ID: InformationQuerySystem
                      • String ID:
                      • API String ID: 3562636166-0
                      • Opcode ID: 26554ef4172f504c60ff77cc7783893aa518f27f70761b5eb7f82cb4f118ad43
                      • Instruction ID: e76c8c985a9c5911c03f7a56a09dfd2d901fe3adab8f23600fd13184f0d6b922
                      • Opcode Fuzzy Hash: 26554ef4172f504c60ff77cc7783893aa518f27f70761b5eb7f82cb4f118ad43
                      • Instruction Fuzzy Hash: 92014B79504640DFDB208F55DD84B61FBE0EF08724F08C4AADE894A762D375E918DFA2
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480586343.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4ec0000_server.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 75cb298e6e5ef7a77a832e818e050a760610cf5ad9a63ef3d85497f7173aa510
                      • Instruction ID: 8f346a4488d305226daa56bd3778837d53a823f2b7f3fc4f39617573d2f32980
                      • Opcode Fuzzy Hash: 75cb298e6e5ef7a77a832e818e050a760610cf5ad9a63ef3d85497f7173aa510
                      • Instruction Fuzzy Hash: 9DE25B75A012688FDB25EF34C994BADB7B2FB58304F0081E9D909673A5DB356E81CF50
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480586343.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4ec0000_server.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 178991d4f657a90c17e207a4093b1eef0ceba62cf18c3da80be34a6e0f29fecb
                      • Instruction ID: 6d8ad114cb90a7f295b3f3f06a01fcf46266f248bd52ad13bb2d3d94da700e2d
                      • Opcode Fuzzy Hash: 178991d4f657a90c17e207a4093b1eef0ceba62cf18c3da80be34a6e0f29fecb
                      • Instruction Fuzzy Hash: 95D26B75A012688FDB25EF34D994BADBBB2FB58304F0081E9D809673A5DB356E81CF50
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480586343.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4ec0000_server.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 03d4f365e154f1b3588ace6b0bda46c1be349ebc63044cf7e400071a1931490a
                      • Instruction ID: 79f794cec3ddd48f24612d8028413ce48e0925d34b474c8916ceaa2d7cb09628
                      • Opcode Fuzzy Hash: 03d4f365e154f1b3588ace6b0bda46c1be349ebc63044cf7e400071a1931490a
                      • Instruction Fuzzy Hash: 0CD26B75A012688FDB65EF34C994BADB7B2FB68304F0081E9D809673A5DB356E81CF50
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480586343.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4ec0000_server.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 418b5f06a839261b485e370e1a95708f49553978d09586cc86ac0ac4d8ca2e99
                      • Instruction ID: 7c030d59159203333cea6c4da7936784186f9f9c136b2da964f5d7ddc5cf6060
                      • Opcode Fuzzy Hash: 418b5f06a839261b485e370e1a95708f49553978d09586cc86ac0ac4d8ca2e99
                      • Instruction Fuzzy Hash: 6BC24875A01228CFDB25EF34C954BA9B7B2FB58304F1081E9D9096B3A5DB35AE81CF50
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480586343.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4ec0000_server.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ae259bab7ebf322ffd1633ba65e89ab61a4d55a5cd0b7df5ecb6ba912570407a
                      • Instruction ID: 6d0d5c4590f1c79a091e6343e2656e692a442d623c1adafc32106317bd57a9fe
                      • Opcode Fuzzy Hash: ae259bab7ebf322ffd1633ba65e89ab61a4d55a5cd0b7df5ecb6ba912570407a
                      • Instruction Fuzzy Hash: 0532C0326012528BDB35AB31DA8077E77E2BF54259B04807EE491DB3D5EF38E942DB90
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480586343.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4ec0000_server.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: aa91c75b0d1f4522395a2c715472bd994276a0295145676a9b20aac92eba94ad
                      • Instruction ID: 0949bb864e1c2f520828fa095be1b101c00dd64d47a10ddb2225d40e33c95793
                      • Opcode Fuzzy Hash: aa91c75b0d1f4522395a2c715472bd994276a0295145676a9b20aac92eba94ad
                      • Instruction Fuzzy Hash: D00217729002629BD739AF30868157DB3637F50356715813EE8A59B2D0EF2AFC52CF90

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 5623 cdb126-cdb128 5624 cdb12a-cdb130 5623->5624 5625 cdb132-cdb1d1 5623->5625 5624->5625 5630 cdb1d6-cdb1ed 5625->5630 5631 cdb1d3 5625->5631 5633 cdb22f-cdb234 5630->5633 5634 cdb1ef-cdb202 RegOpenKeyExW 5630->5634 5631->5630 5633->5634 5635 cdb204-cdb22c 5634->5635 5636 cdb236-cdb23b 5634->5636 5636->5635
                      APIs
                      • RegOpenKeyExW.KERNELBASE(?,00000E24), ref: 00CDB1F5
                      Memory Dump Source
                      • Source File: 00000002.00000002.4478337591.0000000000CDA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_cda000_server.jbxd
                      Similarity
                      • API ID: Open
                      • String ID:
                      • API String ID: 71445658-0
                      • Opcode ID: 63ce72958197a070eb326cdecf6a35e5d3d7ec0ae3efa4b4f3b247eba10aaafd
                      • Instruction ID: 57b0a036a2079aacd70279f54e4f6a3e99ace1d85648a43f5cbb112f9adc80ae
                      • Opcode Fuzzy Hash: 63ce72958197a070eb326cdecf6a35e5d3d7ec0ae3efa4b4f3b247eba10aaafd
                      • Instruction Fuzzy Hash: 67319372509380AFE7238B608C54BA6BFB8EF17314F0944DBE984CB663D224E909C771

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 5641 4d20bb4-4d20c2a 5645 4d20c2f-4d20c3b 5641->5645 5646 4d20c2c 5641->5646 5647 4d20c40-4d20c49 5645->5647 5648 4d20c3d 5645->5648 5646->5645 5649 4d20c4b 5647->5649 5650 4d20c4e-4d20c65 5647->5650 5648->5647 5649->5650 5652 4d20ca7-4d20cac 5650->5652 5653 4d20c67-4d20c7a RegCreateKeyExW 5650->5653 5652->5653 5654 4d20cae-4d20cb3 5653->5654 5655 4d20c7c-4d20ca4 5653->5655 5654->5655
                      APIs
                      • RegCreateKeyExW.KERNELBASE(?,00000E24), ref: 04D20C6D
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480454131.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4d20000_server.jbxd
                      Similarity
                      • API ID: Create
                      • String ID:
                      • API String ID: 2289755597-0
                      • Opcode ID: 4a9cf9a409e4df94e2de3272ce04cc106ce9975aa41d9a404e405469aab04e45
                      • Instruction ID: 92cddda295fb38f49879ae98af18449940ca13ef929e6339fd5c727ddbe3fc4e
                      • Opcode Fuzzy Hash: 4a9cf9a409e4df94e2de3272ce04cc106ce9975aa41d9a404e405469aab04e45
                      • Instruction Fuzzy Hash: 403190B2500344AFE7228F25CD44FA7BBECEF19614F04445AF985C7652D320E509DB71

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 5660 4d21613-4d21633 5661 4d21655-4d21687 5660->5661 5662 4d21635-4d21654 5660->5662 5666 4d2168a-4d216e2 RegQueryValueExW 5661->5666 5662->5661 5668 4d216e8-4d216fe 5666->5668
                      APIs
                      • RegQueryValueExW.KERNELBASE(?,00000E24,?,?), ref: 04D216DA
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480454131.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4d20000_server.jbxd
                      Similarity
                      • API ID: QueryValue
                      • String ID:
                      • API String ID: 3660427363-0
                      • Opcode ID: 33521b7062c7410a8d7bb2d2bfab673a82afc81ef38f6bd59cb1465b67a4e4d0
                      • Instruction ID: 20daba4517df9b1d734038356446717d7e0b686cc6b05a320d9575e3400d0a10
                      • Opcode Fuzzy Hash: 33521b7062c7410a8d7bb2d2bfab673a82afc81ef38f6bd59cb1465b67a4e4d0
                      • Instruction Fuzzy Hash: 98316D6510E3C06FD3138B258C65A61BFB4EF47614B0E85CBE8848B6A3D219A919D7B2

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 5669 cdaa75-cdaafe 5673 cdab00 5669->5673 5674 cdab03-cdab0f 5669->5674 5673->5674 5675 cdab14-cdab1d 5674->5675 5676 cdab11 5674->5676 5677 cdab1f-cdab43 CreateFileW 5675->5677 5678 cdab6e-cdab73 5675->5678 5676->5675 5681 cdab75-cdab7a 5677->5681 5682 cdab45-cdab6b 5677->5682 5678->5677 5681->5682
                      APIs
                      • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 00CDAB25
                      Memory Dump Source
                      • Source File: 00000002.00000002.4478337591.0000000000CDA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_cda000_server.jbxd
                      Similarity
                      • API ID: CreateFile
                      • String ID:
                      • API String ID: 823142352-0
                      • Opcode ID: 7d97e5529573b18c790f55cfd231ca1455697876cea56c76be7a2478a5ea7b60
                      • Instruction ID: 33cbddc741bd1255e66304ef8af2abd0368ae1417e7927e05254014cbb953167
                      • Opcode Fuzzy Hash: 7d97e5529573b18c790f55cfd231ca1455697876cea56c76be7a2478a5ea7b60
                      • Instruction Fuzzy Hash: FE318071505340AFE721CF25CC84F96BBF8EF06314F08849EE9858B252D365E909CB72

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 5718 4d21184-4d21210 5723 4d21212-4d2121a GetExitCodeProcess 5718->5723 5724 4d2125b-4d21260 5718->5724 5725 4d21220-4d21232 5723->5725 5724->5723 5727 4d21262-4d21267 5725->5727 5728 4d21234-4d2125a 5725->5728 5727->5728
                      APIs
                      • GetExitCodeProcess.KERNELBASE(?,00000E24,1A30CFE9,00000000,00000000,00000000,00000000), ref: 04D21218
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480454131.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4d20000_server.jbxd
                      Similarity
                      • API ID: CodeExitProcess
                      • String ID:
                      • API String ID: 3861947596-0
                      • Opcode ID: a499351fe9891ab791a1844208a78d646c0961bcd087685510a5544f26e155af
                      • Instruction ID: f0d7c6986be727c2a3721a42db596c8a7aadd05e832f78ebc896e57830aacc4c
                      • Opcode Fuzzy Hash: a499351fe9891ab791a1844208a78d646c0961bcd087685510a5544f26e155af
                      • Instruction Fuzzy Hash: 5021E6755097805FD7128F20DC45B96BFB8EF57324F0884DAE984CF193D364A909C761

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 5731 4d21b2c-4d21bad 5735 4d21bb2-4d21bbb 5731->5735 5736 4d21baf 5731->5736 5737 4d21c13-4d21c18 5735->5737 5738 4d21bbd-4d21bc5 ConvertStringSecurityDescriptorToSecurityDescriptorW 5735->5738 5736->5735 5737->5738 5739 4d21bcb-4d21bdd 5738->5739 5741 4d21c1a-4d21c1f 5739->5741 5742 4d21bdf-4d21c10 5739->5742 5741->5742
                      APIs
                      • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32(?,00000E24), ref: 04D21BC3
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480454131.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4d20000_server.jbxd
                      Similarity
                      • API ID: DescriptorSecurity$ConvertString
                      • String ID:
                      • API String ID: 3907675253-0
                      • Opcode ID: c7a0bad8407c911713788d4b5798678d78d12307707026b4e3037869885169b2
                      • Instruction ID: 3d4ea3e275ceb1d5318f13f0a7b6aa89e8d56aa5cade6e70f90f1aef26ff0e74
                      • Opcode Fuzzy Hash: c7a0bad8407c911713788d4b5798678d78d12307707026b4e3037869885169b2
                      • Instruction Fuzzy Hash: B731BF71504384AFE721CF64DC44FABBBB8EF16214F08849AE944CB652D364E908CB71

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 5685 cdaf76-cdaff9 5689 cdaffe-cdb007 5685->5689 5690 cdaffb 5685->5690 5691 cdb00c-cdb015 5689->5691 5692 cdb009 5689->5692 5690->5689 5693 cdb017-cdb03b CreateMutexW 5691->5693 5694 cdb066-cdb06b 5691->5694 5692->5691 5697 cdb06d-cdb072 5693->5697 5698 cdb03d-cdb063 5693->5698 5694->5693 5697->5698
                      APIs
                      • CreateMutexW.KERNELBASE(?,?), ref: 00CDB01D
                      Memory Dump Source
                      • Source File: 00000002.00000002.4478337591.0000000000CDA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_cda000_server.jbxd
                      Similarity
                      • API ID: CreateMutex
                      • String ID:
                      • API String ID: 1964310414-0
                      • Opcode ID: 625169ef50e7ac3e803553e43942c37e52abfd8eff3601125dd43709a8290a4e
                      • Instruction ID: 0e846661ee0fe386407c2d4369eab6e48f480bba0659126629e0384c77eafe41
                      • Opcode Fuzzy Hash: 625169ef50e7ac3e803553e43942c37e52abfd8eff3601125dd43709a8290a4e
                      • Instruction Fuzzy Hash: 203195B15093805FE721CB25DC45F96BFF8EF16314F08849AE944CB292D365E909C772

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 5701 cdb23d-cdb2bb 5704 cdb2bd 5701->5704 5705 cdb2c0-cdb2c9 5701->5705 5704->5705 5706 cdb2ce-cdb2d4 5705->5706 5707 cdb2cb 5705->5707 5708 cdb2d9-cdb2f0 5706->5708 5709 cdb2d6 5706->5709 5707->5706 5711 cdb327-cdb32c 5708->5711 5712 cdb2f2-cdb305 RegQueryValueExW 5708->5712 5709->5708 5711->5712 5713 cdb32e-cdb333 5712->5713 5714 cdb307-cdb324 5712->5714 5713->5714
                      APIs
                      • RegQueryValueExW.KERNELBASE(?,00000E24,1A30CFE9,00000000,00000000,00000000,00000000), ref: 00CDB2F8
                      Memory Dump Source
                      • Source File: 00000002.00000002.4478337591.0000000000CDA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_cda000_server.jbxd
                      Similarity
                      • API ID: QueryValue
                      • String ID:
                      • API String ID: 3660427363-0
                      • Opcode ID: 5b41b1a1d091a2dd7c8ab0f0971ff6806cb0c07847646e13c005525a5d4de75b
                      • Instruction ID: 615fe75d4c212d636358a824490509be4917c454611faa3dc77befb841e00a12
                      • Opcode Fuzzy Hash: 5b41b1a1d091a2dd7c8ab0f0971ff6806cb0c07847646e13c005525a5d4de75b
                      • Instruction Fuzzy Hash: 543181751057849FD722CB21CC45FA6BFB8EF06314F09849AE945CB652D364E948CB71

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 5746 4d20bd2-4d20c2a 5749 4d20c2f-4d20c3b 5746->5749 5750 4d20c2c 5746->5750 5751 4d20c40-4d20c49 5749->5751 5752 4d20c3d 5749->5752 5750->5749 5753 4d20c4b 5751->5753 5754 4d20c4e-4d20c65 5751->5754 5752->5751 5753->5754 5756 4d20ca7-4d20cac 5754->5756 5757 4d20c67-4d20c7a RegCreateKeyExW 5754->5757 5756->5757 5758 4d20cae-4d20cb3 5757->5758 5759 4d20c7c-4d20ca4 5757->5759 5758->5759
                      APIs
                      • RegCreateKeyExW.KERNELBASE(?,00000E24), ref: 04D20C6D
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480454131.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4d20000_server.jbxd
                      Similarity
                      • API ID: Create
                      • String ID:
                      • API String ID: 2289755597-0
                      • Opcode ID: 62272e5bbfc06dbe652e6d2272af63fb269452afe1e260c8760ae99306be7552
                      • Instruction ID: 103efab7a4a06cd3c21bca3c69f384d6fb785436b6ed08c1cd40db688e1e1c24
                      • Opcode Fuzzy Hash: 62272e5bbfc06dbe652e6d2272af63fb269452afe1e260c8760ae99306be7552
                      • Instruction Fuzzy Hash: 2D21A2B2600204AFE7319F15CD84FA7B7ECFF18618F04856AEA45C6651E720F5089B71

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 5768 4d20cb5-4d20d40 5772 4d20d42 5768->5772 5773 4d20d45-4d20d5c 5768->5773 5772->5773 5775 4d20d93-4d20d98 5773->5775 5776 4d20d5e-4d20d71 RegSetValueExW 5773->5776 5775->5776 5777 4d20d73-4d20d90 5776->5777 5778 4d20d9a-4d20d9f 5776->5778 5778->5777
                      APIs
                      • RegSetValueExW.KERNELBASE(?,00000E24,1A30CFE9,00000000,00000000,00000000,00000000), ref: 04D20D64
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480454131.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4d20000_server.jbxd
                      Similarity
                      • API ID: Value
                      • String ID:
                      • API String ID: 3702945584-0
                      • Opcode ID: 51b4f6219a63a6a5bdb7638f308b07edd52b00bfbce40d51b070868de210414b
                      • Instruction ID: 9331670d814afbd56d4db5711e7b464da917eac5111b6e5fd2f62c12242fe00f
                      • Opcode Fuzzy Hash: 51b4f6219a63a6a5bdb7638f308b07edd52b00bfbce40d51b070868de210414b
                      • Instruction Fuzzy Hash: 5031B476509780AFD7228F11CD45B96BFB8EF16314F0844CBE9858F5A2D365A409CBA1
                      APIs
                      • GetProcessWorkingSetSize.KERNEL32(?,00000E24,1A30CFE9,00000000,00000000,00000000,00000000), ref: 04D231C7
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480454131.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4d20000_server.jbxd
                      Similarity
                      • API ID: ProcessSizeWorking
                      • String ID:
                      • API String ID: 3584180929-0
                      • Opcode ID: ebf84aaab208575e14131d7420f072e30a29f0dc7415ac4e88f9f3b9580c60d8
                      • Instruction ID: 7852045a72bab45a5998b9de8d8ec29dc628025e0d288bbd1a2f8c28c26ed5b4
                      • Opcode Fuzzy Hash: ebf84aaab208575e14131d7420f072e30a29f0dc7415ac4e88f9f3b9580c60d8
                      • Instruction Fuzzy Hash: F221A5715093845FD713CB20DC55B96BFB8AF56214F0884DBE9888F193D365E909CB72

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 5782 4d22138-4d221cd 5787 4d2221a-4d2221f 5782->5787 5788 4d221cf-4d221d7 GetProcessTimes 5782->5788 5787->5788 5790 4d221dd-4d221ef 5788->5790 5791 4d22221-4d22226 5790->5791 5792 4d221f1-4d22217 5790->5792 5791->5792
                      APIs
                      • GetProcessTimes.KERNELBASE(?,00000E24,1A30CFE9,00000000,00000000,00000000,00000000), ref: 04D221D5
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480454131.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4d20000_server.jbxd
                      Similarity
                      • API ID: ProcessTimes
                      • String ID:
                      • API String ID: 1995159646-0
                      • Opcode ID: 17a7dbb7fa10dbe6d122b1f85f6a4bcaacbb1c0a5faf985f3f9461d9fbc90b79
                      • Instruction ID: 91d8817fe2854de211497a42a197a09e831307cd64793224383d5c82d66c3f83
                      • Opcode Fuzzy Hash: 17a7dbb7fa10dbe6d122b1f85f6a4bcaacbb1c0a5faf985f3f9461d9fbc90b79
                      • Instruction Fuzzy Hash: 82210472504340AFD722CF50DC45FA6BFB8EF16324F08849AE9458B5A2D325E909CBB1

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 5764 cda58e-cda5eb 5765 cda5ee-cda646 GetUserNameW 5764->5765 5767 cda64c-cda662 5765->5767
                      APIs
                      • GetUserNameW.ADVAPI32(?,00000E24,?,?), ref: 00CDA63E
                      Memory Dump Source
                      • Source File: 00000002.00000002.4478337591.0000000000CDA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_cda000_server.jbxd
                      Similarity
                      • API ID: NameUser
                      • String ID:
                      • API String ID: 2645101109-0
                      • Opcode ID: 1fbb129908d1cfa64b646eb5ad81223dc8705d288759fdef20c432045f196396
                      • Instruction ID: 8eb7a9170b236ecbb85b5130004f303eee96592f155889d661946e3de455cc22
                      • Opcode Fuzzy Hash: 1fbb129908d1cfa64b646eb5ad81223dc8705d288759fdef20c432045f196396
                      • Instruction Fuzzy Hash: B8317E7504D3C06FD3138B259C61BA1BFB4EF87614F0A40CBE884CB6A3D229A919D772
                      APIs
                      • SendMessageTimeoutA.USER32(?,00000E24), ref: 00CDB4D5
                      Memory Dump Source
                      • Source File: 00000002.00000002.4478337591.0000000000CDA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_cda000_server.jbxd
                      Similarity
                      • API ID: MessageSendTimeout
                      • String ID:
                      • API String ID: 1599653421-0
                      • Opcode ID: 7f1ac71850b4ad4ad9e6c57b4cfa12b0bc490fafed89ae0fbc62b7420a1ad131
                      • Instruction ID: d6870f1d95a575642284230165096ce07181165b3e356cc274a4f069d04a26cb
                      • Opcode Fuzzy Hash: 7f1ac71850b4ad4ad9e6c57b4cfa12b0bc490fafed89ae0fbc62b7420a1ad131
                      • Instruction Fuzzy Hash: AC21B471104740AFE7228F61DC44FA6FFB8EF46314F08849AFA858B662D375E909CB61
                      APIs
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480454131.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4d20000_server.jbxd
                      Similarity
                      • API ID: select
                      • String ID:
                      • API String ID: 1274211008-0
                      • Opcode ID: 5b8008eef64779099d696322b390f07bc129f36936c414950292024c6af2d1e9
                      • Instruction ID: 807dcbfc52d1d69f7adf58c590292f829189295ea631686460f42407b6e7b8a5
                      • Opcode Fuzzy Hash: 5b8008eef64779099d696322b390f07bc129f36936c414950292024c6af2d1e9
                      • Instruction Fuzzy Hash: 5E218C712083849FDB22CF24DD44B92BFF8EF06214B08849AED84CB162D265E809CB72
                      APIs
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480454131.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4d20000_server.jbxd
                      Similarity
                      • API ID: FileView
                      • String ID:
                      • API String ID: 3314676101-0
                      • Opcode ID: bde50ab6b9ced5fbe67f5096895676a648e8921694e92050794da51cb55190c5
                      • Instruction ID: 5174905a1373974063cb2a1192e5b3f3d893b30aad60c45cbe7749d088cbdb8f
                      • Opcode Fuzzy Hash: bde50ab6b9ced5fbe67f5096895676a648e8921694e92050794da51cb55190c5
                      • Instruction Fuzzy Hash: 9721BF71405380AFE722CF15CC44F96FBF8EF19224F08849EE9898B652D365E508CBB2
                      APIs
                      • WSASocketW.WS2_32(?,?,?,?,?), ref: 04D21792
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480454131.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4d20000_server.jbxd
                      Similarity
                      • API ID: Socket
                      • String ID:
                      • API String ID: 38366605-0
                      • Opcode ID: b4f5c4760f1d12db96cd2ed347d97d4f93deb0e3a4effeb7d6e15c348e9c0260
                      • Instruction ID: d357e5816777328f27976f932965c019ffa739149aaa0631331cfc93d3a4309d
                      • Opcode Fuzzy Hash: b4f5c4760f1d12db96cd2ed347d97d4f93deb0e3a4effeb7d6e15c348e9c0260
                      • Instruction Fuzzy Hash: F6219E71509380AFD721CF61CD84F96FFB8EF1A214F08889EE9858B652D375E408CB62
                      APIs
                      • RegSetValueExW.KERNELBASE(?,00000E24,1A30CFE9,00000000,00000000,00000000,00000000), ref: 00CDB3E4
                      Memory Dump Source
                      • Source File: 00000002.00000002.4478337591.0000000000CDA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_cda000_server.jbxd
                      Similarity
                      • API ID: Value
                      • String ID:
                      • API String ID: 3702945584-0
                      • Opcode ID: e2f25dc550735ca103af89c4fc73e7c2b7029aeecdc96cd897a3b60229d1fb9c
                      • Instruction ID: f296da21e6ac7854d0fc844a6309372e16c7ca27b0b31ccb86e04144450683fa
                      • Opcode Fuzzy Hash: e2f25dc550735ca103af89c4fc73e7c2b7029aeecdc96cd897a3b60229d1fb9c
                      • Instruction Fuzzy Hash: BF219076509780AFD7228B11DC44FA7BFB8EF56714F08849BE985CB252D364E908CBB1
                      APIs
                      • K32EnumProcesses.KERNEL32(?,?,?,1A30CFE9,00000000,?,?,?,?,?,?,?,?,6C8C3C58), ref: 04D2013E
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480454131.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4d20000_server.jbxd
                      Similarity
                      • API ID: EnumProcesses
                      • String ID:
                      • API String ID: 84517404-0
                      • Opcode ID: 434cbcf806ebfb169a547b3588551b509bc845e936e66b16399f3eb874d1e99a
                      • Instruction ID: 6976bb353a43ae7a29441e15657331e4924138e67dd3f83e9c08e87f276caacf
                      • Opcode Fuzzy Hash: 434cbcf806ebfb169a547b3588551b509bc845e936e66b16399f3eb874d1e99a
                      • Instruction Fuzzy Hash: A8216B715093C09FD7138B65DC55A92BFB4AF17314F0D84DBE984CB1A3D224A918CB62
                      APIs
                      • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32(?,00000E24), ref: 04D21BC3
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480454131.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4d20000_server.jbxd
                      Similarity
                      • API ID: DescriptorSecurity$ConvertString
                      • String ID:
                      • API String ID: 3907675253-0
                      • Opcode ID: 22dbea344d17f8b0e706ab388c98244d56a201b9a88da4b39889cd388dba8ac2
                      • Instruction ID: c7e1151763cf270870086893e066e974225a8c68545b0ccffc0dfaff233340af
                      • Opcode Fuzzy Hash: 22dbea344d17f8b0e706ab388c98244d56a201b9a88da4b39889cd388dba8ac2
                      • Instruction Fuzzy Hash: 6121C271600214AFEB20DF25DD44BABFBA8EF14218F08846AED45CB641E774E5088B71
                      APIs
                      • RegQueryValueExW.KERNELBASE(?,00000E24,1A30CFE9,00000000,00000000,00000000,00000000), ref: 04D21AD8
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480454131.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4d20000_server.jbxd
                      Similarity
                      • API ID: QueryValue
                      • String ID:
                      • API String ID: 3660427363-0
                      • Opcode ID: 2ac59707f8a4531f998a8eb1cb3dcb1d3b68dbe126bc7497c5922e5346b73bef
                      • Instruction ID: a5f29370d7788035714ad2fad6a489078ba4a06548a9e690218b6f0cc6e696a7
                      • Opcode Fuzzy Hash: 2ac59707f8a4531f998a8eb1cb3dcb1d3b68dbe126bc7497c5922e5346b73bef
                      • Instruction Fuzzy Hash: D621A175504380AFE721CF11CD44F97BBF8EF59314F08859AE9858B692D365E908CB71
                      APIs
                      • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 00CDAB25
                      Memory Dump Source
                      • Source File: 00000002.00000002.4478337591.0000000000CDA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_cda000_server.jbxd
                      Similarity
                      • API ID: CreateFile
                      • String ID:
                      • API String ID: 823142352-0
                      • Opcode ID: 71983c56aa3f32c8bf3e7064236138dc85957d5626737567504fad344a0822dd
                      • Instruction ID: 3370ef9ad8130b37c3c44efdf7ef20c087f18fc5fc1d69b7bf25462df5a4ebff
                      • Opcode Fuzzy Hash: 71983c56aa3f32c8bf3e7064236138dc85957d5626737567504fad344a0822dd
                      • Instruction Fuzzy Hash: 2F219F71600200AFE720DF25CD84BA6FBE8EF18314F04846AEA458B751D375E909CB72
                      APIs
                      • RegOpenKeyExW.KERNELBASE(?,00000E24), ref: 00CDB1F5
                      Memory Dump Source
                      • Source File: 00000002.00000002.4478337591.0000000000CDA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_cda000_server.jbxd
                      Similarity
                      • API ID: Open
                      • String ID:
                      • API String ID: 71445658-0
                      • Opcode ID: f497f439e5d0c431f55708448f15fea3c0f2b17a53e7cab12940b8f89453310c
                      • Instruction ID: 192cb6bc7178c927bfcf6f7c0f8025e103eaf9db684e74d6ebdb8f7d7c515561
                      • Opcode Fuzzy Hash: f497f439e5d0c431f55708448f15fea3c0f2b17a53e7cab12940b8f89453310c
                      • Instruction Fuzzy Hash: D4219F72500204AEE7219F55DC84FABFBACEF28714F04845BEA458A751D764E9088BB2
                      APIs
                      • SetProcessWorkingSetSize.KERNEL32(?,00000E24,1A30CFE9,00000000,00000000,00000000,00000000), ref: 04D232AB
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480454131.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4d20000_server.jbxd
                      Similarity
                      • API ID: ProcessSizeWorking
                      • String ID:
                      • API String ID: 3584180929-0
                      • Opcode ID: b86b150fb6a6cb6819e4410b2611f3fe8a9672868c54b94e2e6ef8bd04a0080f
                      • Instruction ID: efa90bfb0783f8b7b94db588b335ccf6f8d038984dbfcd693bdb9d250a27b354
                      • Opcode Fuzzy Hash: b86b150fb6a6cb6819e4410b2611f3fe8a9672868c54b94e2e6ef8bd04a0080f
                      • Instruction Fuzzy Hash: E421C2715093806FD721CF25CC45FA6BFB8EF16214F08849AE944CB252D364E908CBB2
                      APIs
                      • WriteFile.KERNELBASE(?,00000E24,1A30CFE9,00000000,00000000,00000000,00000000), ref: 00CDAE4D
                      Memory Dump Source
                      • Source File: 00000002.00000002.4478337591.0000000000CDA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_cda000_server.jbxd
                      Similarity
                      • API ID: FileWrite
                      • String ID:
                      • API String ID: 3934441357-0
                      • Opcode ID: 4e35ffea5651912e80ad3d920e5c8abdaf632201fe8e7f6d471e52dc7a7ba9d0
                      • Instruction ID: 0968067f25825940cf5658ba90c399f4248539d3f669369bc65a9f3c6a6ce68b
                      • Opcode Fuzzy Hash: 4e35ffea5651912e80ad3d920e5c8abdaf632201fe8e7f6d471e52dc7a7ba9d0
                      • Instruction Fuzzy Hash: A521CF72504340AFE7228F51DC44FA7BFA8EF55324F04849AEA448B652C365A908CBB2
                      APIs
                      • SetErrorMode.KERNELBASE(?), ref: 00CDAA44
                      Memory Dump Source
                      • Source File: 00000002.00000002.4478337591.0000000000CDA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_cda000_server.jbxd
                      Similarity
                      • API ID: ErrorMode
                      • String ID:
                      • API String ID: 2340568224-0
                      • Opcode ID: d462386dc22b6bc61619edff1ef6c0c91e46edd7e94e5298e1cbf7c507c13927
                      • Instruction ID: 0d7550bc295117021fe018c98eb10da00cdf35c532e4fdad21f3ea0c8ef563ca
                      • Opcode Fuzzy Hash: d462386dc22b6bc61619edff1ef6c0c91e46edd7e94e5298e1cbf7c507c13927
                      • Instruction Fuzzy Hash: 9621486540E7C0AFD7138B258C64A51BFB4AF57624F0E81DBD9848F6A3C2689D09CB73
                      APIs
                      • GetFileType.KERNELBASE(?,00000E24,1A30CFE9,00000000,00000000,00000000,00000000), ref: 00CDACBD
                      Memory Dump Source
                      • Source File: 00000002.00000002.4478337591.0000000000CDA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_cda000_server.jbxd
                      Similarity
                      • API ID: FileType
                      • String ID:
                      • API String ID: 3081899298-0
                      • Opcode ID: 805881e559687f3473e7f00970f8d7a491ce4e5952c955fba7f8dd738e99f423
                      • Instruction ID: c6b40020f95d6a970bed3668405dc1039053b6f89460686d15c6bd2a85272d0c
                      • Opcode Fuzzy Hash: 805881e559687f3473e7f00970f8d7a491ce4e5952c955fba7f8dd738e99f423
                      • Instruction Fuzzy Hash: 4821C3B55093806FE7128B11DC40BE2BFB8DF56324F0880DBE9848B293D265A909D772
                      APIs
                      • shutdown.WS2_32(?,00000E24,1A30CFE9,00000000,00000000,00000000,00000000), ref: 04D21FFC
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480454131.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4d20000_server.jbxd
                      Similarity
                      • API ID: shutdown
                      • String ID:
                      • API String ID: 2510479042-0
                      • Opcode ID: 89002c1edac025d2b379e52986a6db763d567fd14535fe3cad2ef032e6dfc795
                      • Instruction ID: 749d03de2aed7d187e42bbaaa360b53ad645f321d3bec8986466d5daee7aaa97
                      • Opcode Fuzzy Hash: 89002c1edac025d2b379e52986a6db763d567fd14535fe3cad2ef032e6dfc795
                      • Instruction Fuzzy Hash: 4F2195715093846FD722CB50CD44B96BFB8EF56314F0884DBE9449B252D369A548CB72
                      APIs
                      • CreateMutexW.KERNELBASE(?,?), ref: 00CDB01D
                      Memory Dump Source
                      • Source File: 00000002.00000002.4478337591.0000000000CDA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_cda000_server.jbxd
                      Similarity
                      • API ID: CreateMutex
                      • String ID:
                      • API String ID: 1964310414-0
                      • Opcode ID: 153f684867e5b58ce774c565afa398c0e9b81abde7405cca6c8d18e0924720cf
                      • Instruction ID: 14946e6e1e8630d62da099dcf6a7210910070ad9d3cd22b2e435e100d4befa0e
                      • Opcode Fuzzy Hash: 153f684867e5b58ce774c565afa398c0e9b81abde7405cca6c8d18e0924720cf
                      • Instruction Fuzzy Hash: BE217FB1600200AFE720DB25DD85BA6BBE8EF18714F04846AEE498B751D775E908CB72
                      APIs
                      Memory Dump Source
                      • Source File: 00000002.00000002.4478337591.0000000000CDA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_cda000_server.jbxd
                      Similarity
                      • API ID: send
                      • String ID:
                      • API String ID: 2809346765-0
                      • Opcode ID: c7ea9111348c92aa74dde6a6dea5fd598d4d42dbfc5c7fbe7b3b58e648e8b173
                      • Instruction ID: 588040f3b10d05bb97d282932ca0696cafb83f80d53cb80cac7181f62ee61d70
                      • Opcode Fuzzy Hash: c7ea9111348c92aa74dde6a6dea5fd598d4d42dbfc5c7fbe7b3b58e648e8b173
                      • Instruction Fuzzy Hash: 9E21AF7240D7C09FD7238B20CC54A52BFB4EF07210F0984DBD9848F1A3C279A919DB62
                      APIs
                      • ioctlsocket.WS2_32(?,00000E24,1A30CFE9,00000000,00000000,00000000,00000000), ref: 04D23017
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480454131.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4d20000_server.jbxd
                      Similarity
                      • API ID: ioctlsocket
                      • String ID:
                      • API String ID: 3577187118-0
                      • Opcode ID: f17c87f1553e2781c12738f325da1d3943aede492da1eee9bc5a426eb6024479
                      • Instruction ID: dd83dd891e67edc10b7df04f16a9aa1d6a3a9d8b7b0d991a62a20a87513f011a
                      • Opcode Fuzzy Hash: f17c87f1553e2781c12738f325da1d3943aede492da1eee9bc5a426eb6024479
                      • Instruction Fuzzy Hash: 5921A1715093846FD722CF21CD44F96BFB8EF56214F08849AE9499B252C375E508CBB2
                      APIs
                      • RegQueryValueExW.KERNELBASE(?,00000E24,1A30CFE9,00000000,00000000,00000000,00000000), ref: 00CDB2F8
                      Memory Dump Source
                      • Source File: 00000002.00000002.4478337591.0000000000CDA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_cda000_server.jbxd
                      Similarity
                      • API ID: QueryValue
                      • String ID:
                      • API String ID: 3660427363-0
                      • Opcode ID: cab1588493735da17b2e16d6a9f336f945b0417401dfefe40dc19a926a54853c
                      • Instruction ID: 07784a2c2ebac3a7284870582595ea23c3c5ed10f38dfd0e886c0237a7bf10f3
                      • Opcode Fuzzy Hash: cab1588493735da17b2e16d6a9f336f945b0417401dfefe40dc19a926a54853c
                      • Instruction Fuzzy Hash: 63218E76600604AFE720CF15DC85FABB7ECEF18714F04846AEA45CB751D764E948CAB1
                      APIs
                      • CopyFileW.KERNELBASE(?,?,?), ref: 00CDB78E
                      Memory Dump Source
                      • Source File: 00000002.00000002.4478337591.0000000000CDA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_cda000_server.jbxd
                      Similarity
                      • API ID: CopyFile
                      • String ID:
                      • API String ID: 1304948518-0
                      • Opcode ID: 07b7654401477140b08e1e0bf0ee023dbbf88984c69ea8b4e06c2bc0e71b8375
                      • Instruction ID: fb1c38eedf70149d65439bcac91bd2e12acf0c4402891e2089467a33c2e24be7
                      • Opcode Fuzzy Hash: 07b7654401477140b08e1e0bf0ee023dbbf88984c69ea8b4e06c2bc0e71b8375
                      • Instruction Fuzzy Hash: ED216D716093809FDB228F25DC54BA2BFE8EF56210F09849AED85CB252D225E808DB71
                      APIs
                      • WSAConnect.WS2_32(?,?,?,?,?,?,?), ref: 04D22392
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480454131.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4d20000_server.jbxd
                      Similarity
                      • API ID: Connect
                      • String ID:
                      • API String ID: 3144859779-0
                      • Opcode ID: 2645f7c2ef9cde818682e63c61f4cface6724351d4665b10cfc9e55b537c5ddc
                      • Instruction ID: 36198c109fd8d7b1542ac73bca4b8ea89d74ede0154e4216dae1a036052875b5
                      • Opcode Fuzzy Hash: 2645f7c2ef9cde818682e63c61f4cface6724351d4665b10cfc9e55b537c5ddc
                      • Instruction Fuzzy Hash: A921AF75009380AFDB22CF60CC84A92BFF4EF06310F0984DAE9858F162D375A809DB72
                      APIs
                      • DeleteFileW.KERNELBASE(?), ref: 00CDB908
                      Memory Dump Source
                      • Source File: 00000002.00000002.4478337591.0000000000CDA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_cda000_server.jbxd
                      Similarity
                      • API ID: DeleteFile
                      • String ID:
                      • API String ID: 4033686569-0
                      • Opcode ID: 5a05bc706270f586a672684066f217a68077d4a29aff477ff2a253f528ec292f
                      • Instruction ID: eee0533723e38e4827debd24c683bc1b67448535d745acde8c18c747291c0a2c
                      • Opcode Fuzzy Hash: 5a05bc706270f586a672684066f217a68077d4a29aff477ff2a253f528ec292f
                      • Instruction Fuzzy Hash: 73219FB25093809FD7128B25DC55B52BFB8DF06314F0984DBED85CF293D264A908CB62
                      APIs
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480454131.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4d20000_server.jbxd
                      Similarity
                      • API ID: FileView
                      • String ID:
                      • API String ID: 3314676101-0
                      • Opcode ID: 51086dd8855184c759528a5390e675e8d44b565a52b2040c3f023e16395b93b0
                      • Instruction ID: cab5e1f0ee55b29fb05544e8d672d8f156dcaa218293e28325491c21c8d479e5
                      • Opcode Fuzzy Hash: 51086dd8855184c759528a5390e675e8d44b565a52b2040c3f023e16395b93b0
                      • Instruction Fuzzy Hash: 2421C371500204AFE721CF15CD85F9AFBE8EF18228F048469E9898B651D375F509CBB2
                      APIs
                      • WSASocketW.WS2_32(?,?,?,?,?), ref: 04D21792
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480454131.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4d20000_server.jbxd
                      Similarity
                      • API ID: Socket
                      • String ID:
                      • API String ID: 38366605-0
                      • Opcode ID: 1702528d536f468509d1af224475a53a31d2aa6a816f6daa07e86a6b45ecd089
                      • Instruction ID: e5ff696eff0deb9a10f4f0280fcc77937836e2fd524f8fe4ee0320cfb19ffd6f
                      • Opcode Fuzzy Hash: 1702528d536f468509d1af224475a53a31d2aa6a816f6daa07e86a6b45ecd089
                      • Instruction Fuzzy Hash: 2621CF71500204AFEB21CF65CD84BA6FBE4EF18324F04886AE9858B651D375F408CB72
                      APIs
                      • LoadLibraryA.KERNELBASE(?,00000E24), ref: 04D2265B
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480454131.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4d20000_server.jbxd
                      Similarity
                      • API ID: LibraryLoad
                      • String ID:
                      • API String ID: 1029625771-0
                      • Opcode ID: 8d260e02f258e399c3b3dc282cfac8fefa1ac02fce4bd55b98a875a3a0989fe9
                      • Instruction ID: 6b6eb8ec11e148363d222c91b751aa4aac5ecc83a90b3e96961d1da553325baa
                      • Opcode Fuzzy Hash: 8d260e02f258e399c3b3dc282cfac8fefa1ac02fce4bd55b98a875a3a0989fe9
                      • Instruction Fuzzy Hash: 6F11E4711053406FE721CB11CC85FA6FBB8DF16324F04809AF9489B292D364E948CB62
                      APIs
                      • SendMessageTimeoutA.USER32(?,00000E24), ref: 00CDB4D5
                      Memory Dump Source
                      • Source File: 00000002.00000002.4478337591.0000000000CDA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_cda000_server.jbxd
                      Similarity
                      • API ID: MessageSendTimeout
                      • String ID:
                      • API String ID: 1599653421-0
                      • Opcode ID: 5296ed5f59be89e34765d477fbf7063ee9148cff6a9daf4e1d92ff7b2b58a929
                      • Instruction ID: c29311f10f0f6c0d8f06e23e536dacccc1a8a970b74f5468ff07a1f6bbacd21a
                      • Opcode Fuzzy Hash: 5296ed5f59be89e34765d477fbf7063ee9148cff6a9daf4e1d92ff7b2b58a929
                      • Instruction Fuzzy Hash: D821A271500600AFEB318F51DD40FA6FBA8EF18714F14886AEE498A651D375E918DBB2
                      APIs
                      • RegQueryValueExW.KERNELBASE(?,00000E24,1A30CFE9,00000000,00000000,00000000,00000000), ref: 04D21AD8
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480454131.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4d20000_server.jbxd
                      Similarity
                      • API ID: QueryValue
                      • String ID:
                      • API String ID: 3660427363-0
                      • Opcode ID: edcb9f14f165b5711b7d4bf8296d6bba184ca3ac937f6f7a0d96b34d98020f01
                      • Instruction ID: 6a6e32db7b8537e8c4bde11c07b2ac7577d38eecb37f54db5bb41c53cf6e0c4e
                      • Opcode Fuzzy Hash: edcb9f14f165b5711b7d4bf8296d6bba184ca3ac937f6f7a0d96b34d98020f01
                      • Instruction Fuzzy Hash: 9C11AF76600600AFE720CF55CD80FAAF7E8EF18718F08C56AE9458A651D760F508CAB1
                      APIs
                      • SetFileAttributesW.KERNELBASE(?,?), ref: 00CDB9BF
                      Memory Dump Source
                      • Source File: 00000002.00000002.4478337591.0000000000CDA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_cda000_server.jbxd
                      Similarity
                      • API ID: AttributesFile
                      • String ID:
                      • API String ID: 3188754299-0
                      • Opcode ID: e54bff45dbbd3437ad4593cab7287178866cd038fc4e41c05b5e2395cb6b287a
                      • Instruction ID: eada92385e69130082810cfb81ccc6916824c3f87af4b41f96dcc0e248e9e54e
                      • Opcode Fuzzy Hash: e54bff45dbbd3437ad4593cab7287178866cd038fc4e41c05b5e2395cb6b287a
                      • Instruction Fuzzy Hash: D32181755093C09FD7128B25DC95B96BFF8EF06320F0984DBE945CB262D264A905CB62
                      APIs
                      • RegSetValueExW.KERNELBASE(?,00000E24,1A30CFE9,00000000,00000000,00000000,00000000), ref: 00CDB3E4
                      Memory Dump Source
                      • Source File: 00000002.00000002.4478337591.0000000000CDA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_cda000_server.jbxd
                      Similarity
                      • API ID: Value
                      • String ID:
                      • API String ID: 3702945584-0
                      • Opcode ID: 8f802efc71e7e6f4c1894b59f314fc8c97f5b35c6c1ba8ca868d4b3838db4983
                      • Instruction ID: fbff68b0242c117bee8b9343c0d0cd430a97981de450a391abf97667910e30a7
                      • Opcode Fuzzy Hash: 8f802efc71e7e6f4c1894b59f314fc8c97f5b35c6c1ba8ca868d4b3838db4983
                      • Instruction Fuzzy Hash: 8F11B176600600AFE7208F15CC41FA6BBE8EF18714F04846BEA458A752D774E9089AB1
                      APIs
                      • GetProcessTimes.KERNELBASE(?,00000E24,1A30CFE9,00000000,00000000,00000000,00000000), ref: 04D221D5
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480454131.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4d20000_server.jbxd
                      Similarity
                      • API ID: ProcessTimes
                      • String ID:
                      • API String ID: 1995159646-0
                      • Opcode ID: 87e4ea1520ba6b7a9eb1beb1be30c7360ef9001b1b65cd4a12a04abacb2e9fa7
                      • Instruction ID: 0a678d15975b1665b32cd43e1a9939be575450664a151d5d105ccd170e9c3176
                      • Opcode Fuzzy Hash: 87e4ea1520ba6b7a9eb1beb1be30c7360ef9001b1b65cd4a12a04abacb2e9fa7
                      • Instruction Fuzzy Hash: AB11D371600200AFEB21CF55DD84FA6BBE8EF18318F04886AFE45CB651D775E4088BB2
                      APIs
                      • LookupPrivilegeValueW.ADVAPI32(?,?,?), ref: 00CDBC6E
                      Memory Dump Source
                      • Source File: 00000002.00000002.4478337591.0000000000CDA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_cda000_server.jbxd
                      Similarity
                      • API ID: LookupPrivilegeValue
                      • String ID:
                      • API String ID: 3899507212-0
                      • Opcode ID: c927bd416446a21d262a3774609f954aa701128b78c58a310cda0429a64b3763
                      • Instruction ID: 85cf5ee0601dc5a47bf84f0dae61de775ce660752be4052672ab1089fe7a0a75
                      • Opcode Fuzzy Hash: c927bd416446a21d262a3774609f954aa701128b78c58a310cda0429a64b3763
                      • Instruction Fuzzy Hash: 60118EB16043809FDB21CF25DD84B66BFE8EF56220F0884AAEE45CB252D275E904CB61
                      APIs
                      • SetProcessWorkingSetSize.KERNEL32(?,00000E24,1A30CFE9,00000000,00000000,00000000,00000000), ref: 04D232AB
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480454131.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4d20000_server.jbxd
                      Similarity
                      • API ID: ProcessSizeWorking
                      • String ID:
                      • API String ID: 3584180929-0
                      • Opcode ID: 8b6f4da5d1b7ba8336c2aff3ac7e286569c46c6943669ff963ac11d25748365d
                      • Instruction ID: 78d076c00a2c72411dcc93b12b536bd38013e19290733909bdba3a23233c73df
                      • Opcode Fuzzy Hash: 8b6f4da5d1b7ba8336c2aff3ac7e286569c46c6943669ff963ac11d25748365d
                      • Instruction Fuzzy Hash: E111C471600240AFE720CF69DD85BA6BBA8EF14328F04C46AED45CB641D774E5088BB2
                      APIs
                      • GetProcessWorkingSetSize.KERNEL32(?,00000E24,1A30CFE9,00000000,00000000,00000000,00000000), ref: 04D231C7
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480454131.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4d20000_server.jbxd
                      Similarity
                      • API ID: ProcessSizeWorking
                      • String ID:
                      • API String ID: 3584180929-0
                      • Opcode ID: 8b6f4da5d1b7ba8336c2aff3ac7e286569c46c6943669ff963ac11d25748365d
                      • Instruction ID: 7994334d9c34eb0c454cd6939a0c610ea814e124576de8de5ef51c59e01759b7
                      • Opcode Fuzzy Hash: 8b6f4da5d1b7ba8336c2aff3ac7e286569c46c6943669ff963ac11d25748365d
                      • Instruction Fuzzy Hash: AD11E771600214AFEB21CF65DD84BA6FBE8EF54328F04C46AED45CB641D775E5088BB2
                      APIs
                      • GetExitCodeProcess.KERNELBASE(?,00000E24,1A30CFE9,00000000,00000000,00000000,00000000), ref: 04D21218
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480454131.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4d20000_server.jbxd
                      Similarity
                      • API ID: CodeExitProcess
                      • String ID:
                      • API String ID: 3861947596-0
                      • Opcode ID: c86b6fed84e128e1c63b06f924c210048af72c1d40554a1b3a8ff4bbfebe0c2b
                      • Instruction ID: 1050a4f01de49e7f43ee4d59ece7f64f28577d98461b8d78e54c93ecf2c7a3df
                      • Opcode Fuzzy Hash: c86b6fed84e128e1c63b06f924c210048af72c1d40554a1b3a8ff4bbfebe0c2b
                      • Instruction Fuzzy Hash: 3911E371600200AFEB20CF15DD85BAAB7A8EF54628F04C46AFD49CB641D774E5088AB2
                      APIs
                      • RegSetValueExW.KERNELBASE(?,00000E24,1A30CFE9,00000000,00000000,00000000,00000000), ref: 04D20D64
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480454131.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4d20000_server.jbxd
                      Similarity
                      • API ID: Value
                      • String ID:
                      • API String ID: 3702945584-0
                      • Opcode ID: f8b9fbfd5bb0e073f3e744b48382e14398d9456778b61afa11655e17fbd17da4
                      • Instruction ID: fb99b14d589b992b277ea9c2f9fdc4c23a659282eb67dd02c8a7670aae7522df
                      • Opcode Fuzzy Hash: f8b9fbfd5bb0e073f3e744b48382e14398d9456778b61afa11655e17fbd17da4
                      • Instruction Fuzzy Hash: F611B676600604AFD7218F15CD80FA6FBE8EF18714F04845AEA458AA51D375F508CAB1
                      APIs
                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00CDA49E
                      Memory Dump Source
                      • Source File: 00000002.00000002.4478337591.0000000000CDA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_cda000_server.jbxd
                      Similarity
                      • API ID: DuplicateHandle
                      • String ID:
                      • API String ID: 3793708945-0
                      • Opcode ID: c9af39a62bbaa055ac61f8dd38dd9f9a1e833bfa6f8f57e5adadd0f5c2ec318a
                      • Instruction ID: 901df2d923a295596697ec3ae3c437ecc22f97d68b424c03716b513233bd4450
                      • Opcode Fuzzy Hash: c9af39a62bbaa055ac61f8dd38dd9f9a1e833bfa6f8f57e5adadd0f5c2ec318a
                      • Instruction Fuzzy Hash: 62117571409780AFDB228F51DC44B62FFF4EF4A314F0884DAEE858B552C275A519DB62
                      APIs
                      • WriteFile.KERNELBASE(?,00000E24,1A30CFE9,00000000,00000000,00000000,00000000), ref: 00CDAE4D
                      Memory Dump Source
                      • Source File: 00000002.00000002.4478337591.0000000000CDA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_cda000_server.jbxd
                      Similarity
                      • API ID: FileWrite
                      • String ID:
                      • API String ID: 3934441357-0
                      • Opcode ID: bb17bcb8337850ebc02cdd986a9e3159cee16b0a955ac336d2b30362aa406263
                      • Instruction ID: ec4e5f01e10d0fff23b381faaf72bd2c4483ee4f34b93df4022b7959cfc81e82
                      • Opcode Fuzzy Hash: bb17bcb8337850ebc02cdd986a9e3159cee16b0a955ac336d2b30362aa406263
                      • Instruction Fuzzy Hash: 0A11B271500200AFEB21CF55DC44FA6FBA8EF18714F04886AEA498B651C375E518CBB2
                      APIs
                      • ioctlsocket.WS2_32(?,00000E24,1A30CFE9,00000000,00000000,00000000,00000000), ref: 04D23017
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480454131.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4d20000_server.jbxd
                      Similarity
                      • API ID: ioctlsocket
                      • String ID:
                      • API String ID: 3577187118-0
                      • Opcode ID: bf28e99d8af3f6577e8ace8bb068268b7d589f47e8d3142ddddfa2da0023708d
                      • Instruction ID: faa670a14e3fe21cee1867dc845f22f1e3d1d8732acf5b3991280b9a7fb2d5e2
                      • Opcode Fuzzy Hash: bf28e99d8af3f6577e8ace8bb068268b7d589f47e8d3142ddddfa2da0023708d
                      • Instruction Fuzzy Hash: BA11E771600200AFE721CF25CD84BA6F7A8EF54318F04C46AED498B641D375E5088BB2
                      APIs
                      • shutdown.WS2_32(?,00000E24,1A30CFE9,00000000,00000000,00000000,00000000), ref: 04D21FFC
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480454131.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4d20000_server.jbxd
                      Similarity
                      • API ID: shutdown
                      • String ID:
                      • API String ID: 2510479042-0
                      • Opcode ID: 9b061ed7e36f4397ea0ba682a9aeb468b0ecbbad38194bbfaabc091320b385b7
                      • Instruction ID: b5fbaac5c2a298f7e6a47199aad7f187082f1c24d0712085e84c35bbd63420cb
                      • Opcode Fuzzy Hash: 9b061ed7e36f4397ea0ba682a9aeb468b0ecbbad38194bbfaabc091320b385b7
                      • Instruction Fuzzy Hash: 5F11C671600214AFE720CF15DE84BA6B7A8EF54728F04C4A6ED448B641D775E508CAB6
                      APIs
                      • LoadLibraryA.KERNELBASE(?,00000E24), ref: 04D2265B
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480454131.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4d20000_server.jbxd
                      Similarity
                      • API ID: LibraryLoad
                      • String ID:
                      • API String ID: 1029625771-0
                      • Opcode ID: 59db07e99c0156c9b2c71dec9582b51c5802334885f8d92b99226ffbe37947d1
                      • Instruction ID: a2a97d957ac838e06a9248f8b6ac5dbc9a75d4aa7c524e626dcf9d60a41bd1f6
                      • Opcode Fuzzy Hash: 59db07e99c0156c9b2c71dec9582b51c5802334885f8d92b99226ffbe37947d1
                      • Instruction Fuzzy Hash: 4C11E971600200AEE7208B15DD85FB6F7A8DF14718F048099FE445A781D3B9F548CAB6
                      APIs
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480454131.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4d20000_server.jbxd
                      Similarity
                      • API ID: select
                      • String ID:
                      • API String ID: 1274211008-0
                      • Opcode ID: b88e63df7240a7e0b326719a76253be956649276bb0d80a5cefaf2799daa9cf5
                      • Instruction ID: aa440bdef5d4bfcc46c76a3fb215985c1b666a1e2bf52e492d2de5d9a684f1e9
                      • Opcode Fuzzy Hash: b88e63df7240a7e0b326719a76253be956649276bb0d80a5cefaf2799daa9cf5
                      • Instruction Fuzzy Hash: A0115B757002149FDB20CF29DA84B96FBE8EF18714F0884AADD49CB251D379E448CB72
                      APIs
                      • CopyFileW.KERNELBASE(?,?,?), ref: 00CDB78E
                      Memory Dump Source
                      • Source File: 00000002.00000002.4478337591.0000000000CDA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_cda000_server.jbxd
                      Similarity
                      • API ID: CopyFile
                      • String ID:
                      • API String ID: 1304948518-0
                      • Opcode ID: 478d4fb58341a67091f7fc474dc9e9eb7464c2b3eb910309f192b40bcedae752
                      • Instruction ID: 78ed0c7788550a2ad129ed76e5d4ec1bd28220d6ed3b91ce94cdaba1cf6691da
                      • Opcode Fuzzy Hash: 478d4fb58341a67091f7fc474dc9e9eb7464c2b3eb910309f192b40bcedae752
                      • Instruction Fuzzy Hash: 6F115A75600200DFDB20CF2AD985B56BBE8AF55720F0984AADE09CB741D374E9048A72
                      APIs
                      • LookupPrivilegeValueW.ADVAPI32(?,?,?), ref: 00CDBC6E
                      Memory Dump Source
                      • Source File: 00000002.00000002.4478337591.0000000000CDA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_cda000_server.jbxd
                      Similarity
                      • API ID: LookupPrivilegeValue
                      • String ID:
                      • API String ID: 3899507212-0
                      • Opcode ID: 478d4fb58341a67091f7fc474dc9e9eb7464c2b3eb910309f192b40bcedae752
                      • Instruction ID: 585f642c6f85a226c96dafa521d2cc1a87f9ca55533dbc13ce32f0bc41c2108a
                      • Opcode Fuzzy Hash: 478d4fb58341a67091f7fc474dc9e9eb7464c2b3eb910309f192b40bcedae752
                      • Instruction Fuzzy Hash: 87117C716002008FDB20CF2AD985B66FBE8EF44320F0884ABDE09CB751D775E904CA62
                      APIs
                      • GetFileType.KERNELBASE(?,00000E24,1A30CFE9,00000000,00000000,00000000,00000000), ref: 00CDACBD
                      Memory Dump Source
                      • Source File: 00000002.00000002.4478337591.0000000000CDA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_cda000_server.jbxd
                      Similarity
                      • API ID: FileType
                      • String ID:
                      • API String ID: 3081899298-0
                      • Opcode ID: 2f555f2578a6afa3f4e1b010ac615843ff18f4c38424c74a5533a50460d1a29a
                      • Instruction ID: 21f939343fa3938db37e639f970933fa001bef529418e466694689d2f84b0e09
                      • Opcode Fuzzy Hash: 2f555f2578a6afa3f4e1b010ac615843ff18f4c38424c74a5533a50460d1a29a
                      • Instruction Fuzzy Hash: 5501D275604200AFE720CB15DD84BA6F7E8DF58724F14C4A7EE088B781D775E9088AB2
                      APIs
                      Memory Dump Source
                      • Source File: 00000002.00000002.4478337591.0000000000CDA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_cda000_server.jbxd
                      Similarity
                      • API ID: CloseFind
                      • String ID:
                      • API String ID: 1863332320-0
                      • Opcode ID: e60bf135b462a87388aad8979cde7d401ec1cca3d84613579daa9784247b624a
                      • Instruction ID: 8a3226ac3e13b8312583fa06c6c1361d6aa123e1065bff9b598af0a93e1bf269
                      • Opcode Fuzzy Hash: e60bf135b462a87388aad8979cde7d401ec1cca3d84613579daa9784247b624a
                      • Instruction Fuzzy Hash: 0B11A5755097809FDB128B25DC84B52FFB4DF06220F0980DBED858B262D275A908CB62
                      APIs
                      • WaitForInputIdle.USER32(?,?), ref: 00CDB6D3
                      Memory Dump Source
                      • Source File: 00000002.00000002.4478337591.0000000000CDA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_cda000_server.jbxd
                      Similarity
                      • API ID: IdleInputWait
                      • String ID:
                      • API String ID: 2200289081-0
                      • Opcode ID: 88742cc650f3c4ef510affea376871cca1c44f727c1033744c80df90c2ab605f
                      • Instruction ID: 28c5a376d3ac0f99fe3224240cdbbd2d76e98bb58131ad6568238cf0ac74911a
                      • Opcode Fuzzy Hash: 88742cc650f3c4ef510affea376871cca1c44f727c1033744c80df90c2ab605f
                      • Instruction Fuzzy Hash: 8D119E715083809FDB21CF25DD84B52BFB4EF46320F09849BED458B262D279A908CB72
                      APIs
                      • K32EnumProcesses.KERNEL32(?,?,?,1A30CFE9,00000000,?,?,?,?,?,?,?,?,6C8C3C58), ref: 04D2013E
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480454131.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4d20000_server.jbxd
                      Similarity
                      • API ID: EnumProcesses
                      • String ID:
                      • API String ID: 84517404-0
                      • Opcode ID: b4686fcfac5e4d108f10a0ca333fe905aca3fc0f4fda71964a60e140ec1d3a68
                      • Instruction ID: 2eea33c63ed88b21a78328591e0255421dfa66f2862abfa94c2e20dbb25e3dc7
                      • Opcode Fuzzy Hash: b4686fcfac5e4d108f10a0ca333fe905aca3fc0f4fda71964a60e140ec1d3a68
                      • Instruction Fuzzy Hash: A511A1716002049FDB22CF29D984B96FBE4EF14324F08C4AADE49CB651D375E408CF62
                      APIs
                      • WSAConnect.WS2_32(?,?,?,?,?,?,?), ref: 04D22392
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480454131.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4d20000_server.jbxd
                      Similarity
                      • API ID: Connect
                      • String ID:
                      • API String ID: 3144859779-0
                      • Opcode ID: cba78b23eb4bd7ec084a6c37cbf9d4345338bd8ae6ae56690761a22f5646ac12
                      • Instruction ID: 4ea921e6b8bc7269bddb56571e6dd917c328e8e23f921afe56efb018e4477097
                      • Opcode Fuzzy Hash: cba78b23eb4bd7ec084a6c37cbf9d4345338bd8ae6ae56690761a22f5646ac12
                      • Instruction Fuzzy Hash: F1115E315046049FDF20CF55D984B56FBE4EF08314F0888AAEE858B651D375E418DF72
                      APIs
                      • SetFileAttributesW.KERNELBASE(?,?), ref: 00CDB9BF
                      Memory Dump Source
                      • Source File: 00000002.00000002.4478337591.0000000000CDA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_cda000_server.jbxd
                      Similarity
                      • API ID: AttributesFile
                      • String ID:
                      • API String ID: 3188754299-0
                      • Opcode ID: e645c4c779da1cbd73e76f572a1a032c64e49624114aa2722b47103e18ecf8f6
                      • Instruction ID: 5371ac3e4ae32f6a0715d80b1c6020c38943e411bd6c5258ed12515b6d8de4e4
                      • Opcode Fuzzy Hash: e645c4c779da1cbd73e76f572a1a032c64e49624114aa2722b47103e18ecf8f6
                      • Instruction Fuzzy Hash: CC016D716052409FDB10CF2AD985766BBE4EF05320F0884AADE45CB752D375E9048A62
                      APIs
                      • DeleteFileW.KERNELBASE(?), ref: 00CDB908
                      Memory Dump Source
                      • Source File: 00000002.00000002.4478337591.0000000000CDA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_cda000_server.jbxd
                      Similarity
                      • API ID: DeleteFile
                      • String ID:
                      • API String ID: 4033686569-0
                      • Opcode ID: 6d4307d9e9761e4e873c998a5f3de2807388df0a51b4f100a6afc0a6d13c27a8
                      • Instruction ID: 4477dd1a42bf9b605fdc30a2e07973240c93cd4946ce17b7b9f0f3062b38fbc2
                      • Opcode Fuzzy Hash: 6d4307d9e9761e4e873c998a5f3de2807388df0a51b4f100a6afc0a6d13c27a8
                      • Instruction Fuzzy Hash: 50018C71A042408FDB10CF2AD9857A6FBE8DF05720F0884ABDE09CB742D375E904CA62
                      APIs
                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00CDA49E
                      Memory Dump Source
                      • Source File: 00000002.00000002.4478337591.0000000000CDA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_cda000_server.jbxd
                      Similarity
                      • API ID: DuplicateHandle
                      • String ID:
                      • API String ID: 3793708945-0
                      • Opcode ID: 05554e143692dc8ad87b829ff6d858baf32c2578a0654fd6c3afa3506e11ec94
                      • Instruction ID: bbbeff73f2b9b34d1fb7a24dbac2cce382b77fbf55df3fccbe3fe67d9c13b5a9
                      • Opcode Fuzzy Hash: 05554e143692dc8ad87b829ff6d858baf32c2578a0654fd6c3afa3506e11ec94
                      • Instruction Fuzzy Hash: FC016D325047009FDB218F55D984B66FBE0EF48724F08C8AAEE4A4A651C3B6E418DF62
                      APIs
                      • RegQueryValueExW.KERNELBASE(?,00000E24,?,?), ref: 04D216DA
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480454131.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4d20000_server.jbxd
                      Similarity
                      • API ID: QueryValue
                      • String ID:
                      • API String ID: 3660427363-0
                      • Opcode ID: a11e2bee644b41e23875af0554927c6b3d989fa709020975f17a69a329addc62
                      • Instruction ID: cb746d3795075b941d639f8b1768f7c7d96a65ac94195a76ad56206270ed1e4a
                      • Opcode Fuzzy Hash: a11e2bee644b41e23875af0554927c6b3d989fa709020975f17a69a329addc62
                      • Instruction Fuzzy Hash: 3B01A271500200ABD310DF16CC46B66FBE8FB88A20F14811AED089BB41D771F915CBE6
                      APIs
                      Memory Dump Source
                      • Source File: 00000002.00000002.4478337591.0000000000CDA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_cda000_server.jbxd
                      Similarity
                      • API ID: send
                      • String ID:
                      • API String ID: 2809346765-0
                      • Opcode ID: 980b6f5225c3cfb72b2eb54ee6201f922466bf8910f620082e96c48206a1cab7
                      • Instruction ID: 596f34876dddfc391e6adb30bd5beb2fdcf0180cfaa74e7d242dc23854e96e45
                      • Opcode Fuzzy Hash: 980b6f5225c3cfb72b2eb54ee6201f922466bf8910f620082e96c48206a1cab7
                      • Instruction Fuzzy Hash: 47018C32504240DFDB20CF55D984B66FBE0EF09320F0888AADE498A611C375E418DBA2
                      APIs
                      • WaitForInputIdle.USER32(?,?), ref: 00CDB6D3
                      Memory Dump Source
                      • Source File: 00000002.00000002.4478337591.0000000000CDA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_cda000_server.jbxd
                      Similarity
                      • API ID: IdleInputWait
                      • String ID:
                      • API String ID: 2200289081-0
                      • Opcode ID: cce71f2e89e5e493caa0f41018867386caae0cae106715960df0520bf7d71cf5
                      • Instruction ID: 7806cdaebcec63ddd40387ad7779b35dc2cf08394703726a9975c0ac998195bb
                      • Opcode Fuzzy Hash: cce71f2e89e5e493caa0f41018867386caae0cae106715960df0520bf7d71cf5
                      • Instruction Fuzzy Hash: D9015A759042409FDB208F16D984B65FBA4EF44324F08C4ABDE498B352D375E904CAA2
                      APIs
                      Memory Dump Source
                      • Source File: 00000002.00000002.4478337591.0000000000CDA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_cda000_server.jbxd
                      Similarity
                      • API ID: CloseFind
                      • String ID:
                      • API String ID: 1863332320-0
                      • Opcode ID: 87069317e663cf7e37a88efbde62b67163685cd8585acb41449817e96d186de2
                      • Instruction ID: 64c48cb51243c7b03ae91959f0875e753d84682ec3fdcff7818e17895130ccd8
                      • Opcode Fuzzy Hash: 87069317e663cf7e37a88efbde62b67163685cd8585acb41449817e96d186de2
                      • Instruction Fuzzy Hash: 1D01F435600600DFDB208F1AD9847A2FBE4DF05320F08C0ABDE098B756D3B5E948CEA2
                      APIs
                      • SetErrorMode.KERNELBASE(?), ref: 00CDAA44
                      Memory Dump Source
                      • Source File: 00000002.00000002.4478337591.0000000000CDA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_cda000_server.jbxd
                      Similarity
                      • API ID: ErrorMode
                      • String ID:
                      • API String ID: 2340568224-0
                      • Opcode ID: 5133f759cae805fd62053180e1c311d744efd60f388eef95cd418a42ff5367d4
                      • Instruction ID: 9d693d45830831ade86ed0cb85ba967e48e429ad143e0bd275331749619babe1
                      • Opcode Fuzzy Hash: 5133f759cae805fd62053180e1c311d744efd60f388eef95cd418a42ff5367d4
                      • Instruction Fuzzy Hash: 4AF0AF355046409FDB208F16DA84BA1FBE0EF04724F08C5ABDE494B752D379E908DEA3
                      APIs
                      • CloseHandle.KERNELBASE(?), ref: 00CDABF0
                      Memory Dump Source
                      • Source File: 00000002.00000002.4478337591.0000000000CDA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_cda000_server.jbxd
                      Similarity
                      • API ID: CloseHandle
                      • String ID:
                      • API String ID: 2962429428-0
                      • Opcode ID: 5df725547031c9cca34baf86568855b516b5fa3283a67129a0d3aa5bfe07c5fc
                      • Instruction ID: ef24d80a62000f1bc34aab2413749ab8aba7f631d1d1f5c295778cfb0d328ccf
                      • Opcode Fuzzy Hash: 5df725547031c9cca34baf86568855b516b5fa3283a67129a0d3aa5bfe07c5fc
                      • Instruction Fuzzy Hash: 5E21D1755093809FD7128B25DD91792BFA8EF06320F0984DBED858F2A3D2659909CB62
                      APIs
                      • CloseHandle.KERNELBASE(?), ref: 00CDBEA8
                      Memory Dump Source
                      • Source File: 00000002.00000002.4478337591.0000000000CDA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_cda000_server.jbxd
                      Similarity
                      • API ID: CloseHandle
                      • String ID:
                      • API String ID: 2962429428-0
                      • Opcode ID: 30ac9d30227c75d3e058a8b3a96899ce15644d72fd7018bf9ca6d40bc117ff35
                      • Instruction ID: 4e7c615c03dc7a614bb9a1842604762521778b0d20592dfda5730afd0cd7ab14
                      • Opcode Fuzzy Hash: 30ac9d30227c75d3e058a8b3a96899ce15644d72fd7018bf9ca6d40bc117ff35
                      • Instruction Fuzzy Hash: 2D21A1715093C05FDB12CB25DC54B92BFB4AF07324F0984DBE9858F663D265A908CB62
                      APIs
                      • CloseHandle.KERNELBASE(?), ref: 00CDA550
                      Memory Dump Source
                      • Source File: 00000002.00000002.4478337591.0000000000CDA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_cda000_server.jbxd
                      Similarity
                      • API ID: CloseHandle
                      • String ID:
                      • API String ID: 2962429428-0
                      • Opcode ID: be88230203cf1fd4a39f26f8396a849c6d6b3b70fe1c2ed9d7900b2401407af7
                      • Instruction ID: 996b6e11d88eee4af354797c47e9b0b6bc485ce66f370c15bee42fe199cbebf0
                      • Opcode Fuzzy Hash: be88230203cf1fd4a39f26f8396a849c6d6b3b70fe1c2ed9d7900b2401407af7
                      • Instruction Fuzzy Hash: E721387150E3C45FDB128B259C94A92BFB4DF07224F0984DBD9858F2A3D2699908DBB2
                      APIs
                      • CloseHandle.KERNELBASE(?), ref: 00CDBEA8
                      Memory Dump Source
                      • Source File: 00000002.00000002.4478337591.0000000000CDA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_cda000_server.jbxd
                      Similarity
                      • API ID: CloseHandle
                      • String ID:
                      • API String ID: 2962429428-0
                      • Opcode ID: 86cc5e7bab4c89a6b306c1b25e46aa6a7159f1aeacdf62743ce8438290f13aa0
                      • Instruction ID: 33a74a0b76f46411b013b1e0cb12673f4289830733c4286306241c493d3130cf
                      • Opcode Fuzzy Hash: 86cc5e7bab4c89a6b306c1b25e46aa6a7159f1aeacdf62743ce8438290f13aa0
                      • Instruction Fuzzy Hash: 630171756042408FDB10CF1AD984796BBE4DF05724F08C4ABDE498BB52D375E908CAA2
                      APIs
                      • CloseHandle.KERNELBASE(?), ref: 00CDABF0
                      Memory Dump Source
                      • Source File: 00000002.00000002.4478337591.0000000000CDA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_cda000_server.jbxd
                      Similarity
                      • API ID: CloseHandle
                      • String ID:
                      • API String ID: 2962429428-0
                      • Opcode ID: 8098696c10d4f2bbca4973758a996dfac3f03fa44b5a23f9409d1decf9c568f6
                      • Instruction ID: b98da936bfd1566907e91ac655c20fc21264d52efe237e1dface08740e78f8c4
                      • Opcode Fuzzy Hash: 8098696c10d4f2bbca4973758a996dfac3f03fa44b5a23f9409d1decf9c568f6
                      • Instruction Fuzzy Hash: 170184756042449FDB10CF16D9857A6FBE4DF45324F08C4ABDE058B751D275E504CE62
                      APIs
                      • CloseHandle.KERNELBASE(?), ref: 00CDA550
                      Memory Dump Source
                      • Source File: 00000002.00000002.4478337591.0000000000CDA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_cda000_server.jbxd
                      Similarity
                      • API ID: CloseHandle
                      • String ID:
                      • API String ID: 2962429428-0
                      • Opcode ID: b2caec3eff3b00717f04881944c48ce7d2bcaa631c4b612446ed24121da7ed39
                      • Instruction ID: 4e0f32200ad8692c638960ed30cfb48d0bf2b279bc6814ffa62349fa3bb3aaf4
                      • Opcode Fuzzy Hash: b2caec3eff3b00717f04881944c48ce7d2bcaa631c4b612446ed24121da7ed39
                      • Instruction Fuzzy Hash: C6018F715046409FDB10CF15E984765FBA4DF04324F08C4ABDE098B352E375E504CEA2
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480586343.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4ec0000_server.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 50c2077c39c90411950bab74959f7583a61cbc11eb1c810e2b2a16d296ca319e
                      • Instruction ID: 6f1ebe9af477c218ad25b51546668fd1a37c236751efabc25f0d747fb2ec7183
                      • Opcode Fuzzy Hash: 50c2077c39c90411950bab74959f7583a61cbc11eb1c810e2b2a16d296ca319e
                      • Instruction Fuzzy Hash: 20C2A074700294CFEF30AB29DA407BD77B2BB68308F0085AA985597785DB34ED66DF21
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480586343.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4ec0000_server.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2a85f17590bda1b553f94b829378315fde623a309cfb9b12507105acb2c6ebe9
                      • Instruction ID: 5ebcea313693452ab16cc59e6e78daea1706b9f2c433d3e1cdee8af442cbaef0
                      • Opcode Fuzzy Hash: 2a85f17590bda1b553f94b829378315fde623a309cfb9b12507105acb2c6ebe9
                      • Instruction Fuzzy Hash: 4192E4747002A09BDF316B29DA117BD37A6BBA830CF0084BE945593795CB34ED6ADF21
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480586343.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4ec0000_server.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9faed441586f1ac30143ede62f3c2b000ce960c370a5f58334a5891c68b5d943
                      • Instruction ID: 436c94f4a1accdfd2c7335bd8f85f4d69abb4b09803391cf0037986097fb4c3a
                      • Opcode Fuzzy Hash: 9faed441586f1ac30143ede62f3c2b000ce960c370a5f58334a5891c68b5d943
                      • Instruction Fuzzy Hash: 9B92E3747002A09BDF316B29DA117BD37A6BBA830CF0084BE945593795CB34ED6ADF21
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480586343.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4ec0000_server.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 23eacc80afa3a19a7622da85407edec2f2583c353c6053ae5519fc8369c545f6
                      • Instruction ID: 62b14b89ae8f2fb70a45d15c9f4a11dd330b16852d83ed4c1f2d4400dd205cb7
                      • Opcode Fuzzy Hash: 23eacc80afa3a19a7622da85407edec2f2583c353c6053ae5519fc8369c545f6
                      • Instruction Fuzzy Hash: 30A23775A01228CFDB25EF34C954BA9B7B2FB58304F1081E9D9096B3A5DB35AE81CF50
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480586343.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4ec0000_server.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 47c038b310334e12648c3476ca12b1f6bc701a6617198f464ffaf679db62c795
                      • Instruction ID: b0dbff907aa61e9ba6b5cf2de7b92f242cb91e3e32cd5e749e2a645174974b39
                      • Opcode Fuzzy Hash: 47c038b310334e12648c3476ca12b1f6bc701a6617198f464ffaf679db62c795
                      • Instruction Fuzzy Hash: 7D923875A01228CFDB25EF34C954BA9B7B2FB58304F1081E9D9096B3A5DB35AE81CF50
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480586343.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4ec0000_server.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ebb88d0236176ab439426f9e90c0d896d0680e3a60cf4d3b3f2ca3fcdf8e477d
                      • Instruction ID: 2ae6c5148f3d990c61a6bd04243cb290a68a5dd6f8e16197fe784c7966dab9da
                      • Opcode Fuzzy Hash: ebb88d0236176ab439426f9e90c0d896d0680e3a60cf4d3b3f2ca3fcdf8e477d
                      • Instruction Fuzzy Hash: C3725A75A00228CFDB25EF34C954BA9B7B6FB58304F1081E9D9096B3A5DB35AE81CF50
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480586343.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4ec0000_server.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 07fa8ccac66f851204fed590f894d2a930c9d569cee8a707ce5ba289f5e83835
                      • Instruction ID: adfd1fa366752a3acdf219298e6bca4284b42a378afa95ede815a98991bdab4c
                      • Opcode Fuzzy Hash: 07fa8ccac66f851204fed590f894d2a930c9d569cee8a707ce5ba289f5e83835
                      • Instruction Fuzzy Hash: E6623A75A00228CFDB25DF34D994BA9B7B6FB58304F1081E9D809AB395DB35AE81CF50
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480586343.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4ec0000_server.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 123021badb1b65c9d580527a55599ce35633d03e1b9a4098dc3887e7681fe965
                      • Instruction ID: 8886d2b916d2a9cd3706700ff5ad4c5e6a775b083bfc81d132a80349c17f33cb
                      • Opcode Fuzzy Hash: 123021badb1b65c9d580527a55599ce35633d03e1b9a4098dc3887e7681fe965
                      • Instruction Fuzzy Hash: 1C522975A01228CFDB25DF34D994BA9B7B6FB58304F1081E9D809AB395DB35AE81CF40
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480586343.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4ec0000_server.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6f256efb104f04b21bd6ba0bf70e709b8cf4e645287d6a040bd932321f9ccac6
                      • Instruction ID: 42841478275d4e4b351e2938be82bc979db431328934d60e68e622fc57efc26e
                      • Opcode Fuzzy Hash: 6f256efb104f04b21bd6ba0bf70e709b8cf4e645287d6a040bd932321f9ccac6
                      • Instruction Fuzzy Hash: 38423A75A00268CFDB25DF34C994BADB7B5BB58304F1081EAD809AB394DB35AE81CF40
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480586343.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4ec0000_server.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ccf748f1d6680c463b9279d7c63070bca82b31a22d4b6e83ecf9d28ea7c9b789
                      • Instruction ID: 34077b39a3056f2e00981617ecc32e3523fa44a85f2f5a12b6e5b6eab4c2955c
                      • Opcode Fuzzy Hash: ccf748f1d6680c463b9279d7c63070bca82b31a22d4b6e83ecf9d28ea7c9b789
                      • Instruction Fuzzy Hash: CA323731A00258CFCB24EF74C955BEDB7B2AB59308F1045ADD509AB3A4DB799E82CF50
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480586343.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4ec0000_server.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 80989f67148547f2bfb8cf55517e995c1d2f6f08a9960544ce49d1ff56104106
                      • Instruction ID: 18f4fc3cb77b7965be5ca851b339e0f136cd78d836de6f2405929640391df981
                      • Opcode Fuzzy Hash: 80989f67148547f2bfb8cf55517e995c1d2f6f08a9960544ce49d1ff56104106
                      • Instruction Fuzzy Hash: 74222975A00268CFDB25DF34D994BA9B7B5BB58304F1081EED819AB395DB35AE81CF00
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480586343.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4ec0000_server.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1313a17a8f8d5a41b07c5ffd28f3aaf53272e66c51259c9282d82b6859e2ad99
                      • Instruction ID: e73e3fd8ede226e43fdf4f8f23ee668e65a7b22c2e65eded69ca58503874cff9
                      • Opcode Fuzzy Hash: 1313a17a8f8d5a41b07c5ffd28f3aaf53272e66c51259c9282d82b6859e2ad99
                      • Instruction Fuzzy Hash: A2023A75A00268CFDB25EF34C994BA9B7B5BB59304F1081EAD909AB394DB359E81CF40
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480586343.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4ec0000_server.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 712642df8374c9319dd01e3472dcb7ca0dd8a41be7b2d609fe6b1c4aa55973d2
                      • Instruction ID: c8a0231d1279a8450fa451bc9a5395b4e70a2eba48f7ea8cd94b41ecb67e5f42
                      • Opcode Fuzzy Hash: 712642df8374c9319dd01e3472dcb7ca0dd8a41be7b2d609fe6b1c4aa55973d2
                      • Instruction Fuzzy Hash: EED15132F00204DFCB29EF74E9516AD77B6AFA8348B20856DE41597369DF399C12CB90
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480586343.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4ec0000_server.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: abbfbd053afc005325c394fc0ae6de2e0f5602990f8ceec83f531fad9b4916a7
                      • Instruction ID: 1c952c410eae7cf2656e2d99bdc8dd19f96a296079d6b4feef285c8d693c9ddb
                      • Opcode Fuzzy Hash: abbfbd053afc005325c394fc0ae6de2e0f5602990f8ceec83f531fad9b4916a7
                      • Instruction Fuzzy Hash: 28A1B0327002018BD724EB39DB44BAD33A6BB94359F14963CE4259B7D5EB35E802CB91
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480586343.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4ec0000_server.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: dd8a44bc1d40be76e87a20cf9367f21f79ab2c35d8c62808b2d91f340b399c9b
                      • Instruction ID: 01b19ddf11ef1cca8f33c2c6b992dcdf48b604234a2689ab245df6371140b23d
                      • Opcode Fuzzy Hash: dd8a44bc1d40be76e87a20cf9367f21f79ab2c35d8c62808b2d91f340b399c9b
                      • Instruction Fuzzy Hash: A9B15032B00204DFCB29EF74E9516AD77B2AFA8308B60856DE415977A9DF399C12CB40
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480586343.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4ec0000_server.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 06f1f31b4ddcc5bbd2d217f12648cd616c4174614530e66ca5de35cd401e0f39
                      • Instruction ID: 15c383325a2aa9542ca8c4636af6a382915a6e2a90c219a578639c2c9096eb53
                      • Opcode Fuzzy Hash: 06f1f31b4ddcc5bbd2d217f12648cd616c4174614530e66ca5de35cd401e0f39
                      • Instruction Fuzzy Hash: B4916131B00204DFCB29EF74E8516AD77B2BFA8308B20856DE415977A9DF399C12CB90
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480586343.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4ec0000_server.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b08a543d081424ddcb9950f6fca92e296ba931ef7d3d0da590bb3fcabcf2b0c6
                      • Instruction ID: 108086e0b1aab272a584c438c970a88dc9111e5b244f6c13025901b2d5f448cb
                      • Opcode Fuzzy Hash: b08a543d081424ddcb9950f6fca92e296ba931ef7d3d0da590bb3fcabcf2b0c6
                      • Instruction Fuzzy Hash: 66B15F70A01264CFDB25EB34C955BAD77B5AF98308F1041EED509AB390DB799E82CF50
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480586343.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4ec0000_server.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8e14ec1408b9d4bc71bda87258456b7633248bb46c44f601c8462177e43c9de5
                      • Instruction ID: 8d665b6b3e4a5a30efe93312b91c85cd300ff85ffe713914cdd610ecf593ae42
                      • Opcode Fuzzy Hash: 8e14ec1408b9d4bc71bda87258456b7633248bb46c44f601c8462177e43c9de5
                      • Instruction Fuzzy Hash: D6815136B00204DFCB29EF74E85166D73B2BFA8308B50856DE415977A9DF399C12CB90
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480586343.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4ec0000_server.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: acee6458c108789f8fe3a795e8984dddbb91f186135bdf40052fd3156a28d000
                      • Instruction ID: 239c55768b304bcfa7fb446eb6d11dc1475d1e60ba0fd79dcc64b535ac873dfd
                      • Opcode Fuzzy Hash: acee6458c108789f8fe3a795e8984dddbb91f186135bdf40052fd3156a28d000
                      • Instruction Fuzzy Hash: 60714032B00204DFCB29EF74E95166D73B2AFA8308B60856DE415977A9DF399C12CB90
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480586343.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4ec0000_server.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fb4c84778e745583d8c0971e22740ab5b45c8df9a1d6d018c4e9cf43553d2548
                      • Instruction ID: 1b33f73268372575a9313bf0216b9613d07ceaff7f5eb0d1756205db662a2ff0
                      • Opcode Fuzzy Hash: fb4c84778e745583d8c0971e22740ab5b45c8df9a1d6d018c4e9cf43553d2548
                      • Instruction Fuzzy Hash: FEA1C535A00218CFCB65EF74D985BECB7B2BB58308F1085AAD919AB355DB359E81CF40
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480586343.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4ec0000_server.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8e17163bbba6f37095a3445d16ff906b9c829ec7ac614ba600a53e9f3801495c
                      • Instruction ID: 926719483af9150297bb02ee4799dea22a563b77601f5d5999f0d481d49b03db
                      • Opcode Fuzzy Hash: 8e17163bbba6f37095a3445d16ff906b9c829ec7ac614ba600a53e9f3801495c
                      • Instruction Fuzzy Hash: BD816931A00258CFCB24EFB4C951BEDB7B2AF55308F0085AED119AB3A4DB795985CF51
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480586343.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4ec0000_server.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0c416d7f4170e40bae19cd8957b889d399b40a35c0e705cd2ae495d47171a3e9
                      • Instruction ID: f1172053849fb7bbdf800573f38261ad6694fc12828f6b118326ae2a7ccd0552
                      • Opcode Fuzzy Hash: 0c416d7f4170e40bae19cd8957b889d399b40a35c0e705cd2ae495d47171a3e9
                      • Instruction Fuzzy Hash: F251A531B002149FCB29EF74E95176D73A6AF98348F10857DE411977A9DF39AC12CB90
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480586343.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4ec0000_server.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f13b06deae6b65a0a68f8d429373244a91d583cb7c5f5139a98d95b955b86396
                      • Instruction ID: d8ad8e36ca22a39c5767b1efaead08698a923a49a9d4e2bed9476f553218e219
                      • Opcode Fuzzy Hash: f13b06deae6b65a0a68f8d429373244a91d583cb7c5f5139a98d95b955b86396
                      • Instruction Fuzzy Hash: EA414931A00258CFDB24EBB4C945BECB7B2BF45308F1045AED009AB365DB785A45CF52
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480586343.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4ec0000_server.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 91fa6e401f5e632d2c8e6d88942cf1ce7e5f4e0dbdce4bcca1549ebd3007a5ef
                      • Instruction ID: ef73917ed4de44c7403844ef6e7e82a6319e5b0b2ff35b85ee81b9f40d7b18e3
                      • Opcode Fuzzy Hash: 91fa6e401f5e632d2c8e6d88942cf1ce7e5f4e0dbdce4bcca1549ebd3007a5ef
                      • Instruction Fuzzy Hash: C631D332B002119FD724BB78D911BAE33A6AB9820CF10887DD505D77A5DF399D1AC7D1
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480586343.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4ec0000_server.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3e5511b18e86dba49092eca058bf424c550a2b5f8297cd23ddfdbd5d2d92b12f
                      • Instruction ID: c7e84f1db03463418ac0754437e41803b360b12ab308c006d6219acb60417b3a
                      • Opcode Fuzzy Hash: 3e5511b18e86dba49092eca058bf424c550a2b5f8297cd23ddfdbd5d2d92b12f
                      • Instruction Fuzzy Hash: BA31B571B002099FDB14DB78D954BAEBBF2BF88214F14807DE405EB3A0DB74A9458B80
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480586343.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4ec0000_server.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cc5c2c9a12e94698aa8926378ccb9a42152d52efdd875a017f733129a00544d9
                      • Instruction ID: 804a3883a08c91b9b3730551b4f1de432109e612acc115d888e897939431154f
                      • Opcode Fuzzy Hash: cc5c2c9a12e94698aa8926378ccb9a42152d52efdd875a017f733129a00544d9
                      • Instruction Fuzzy Hash: D931D8327043805FD725E77598517AD3BA75BD2218F1484BED405CF3A1CF7A9C068792
                      Memory Dump Source
                      • Source File: 00000002.00000002.4484892439.0000000007270000.00000040.00000800.00020000.00000000.sdmp, Offset: 07270000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_7270000_server.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1a179d75f09798d3b2b7a11aaf8b7ddcd0523a7a75734913f3847db56ae72d8d
                      • Instruction ID: de66f0b34a24786932bd74c883386017b3511f7f4771a33c4fe17725a245e7fe
                      • Opcode Fuzzy Hash: 1a179d75f09798d3b2b7a11aaf8b7ddcd0523a7a75734913f3847db56ae72d8d
                      • Instruction Fuzzy Hash: 6611CCB5A08341AFD350CF19D981A5BFBE4FB8C664F04896EF998D7311D231E9048FA2
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480586343.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4ec0000_server.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ab41e71aed75ba8ea9d3a4441e477578573271e20d5ad86917a5acd9bda5aca0
                      • Instruction ID: b05477bea5d85ca7b6f15f5fac3ff64563148166837065fece0c6a5bc717e3ca
                      • Opcode Fuzzy Hash: ab41e71aed75ba8ea9d3a4441e477578573271e20d5ad86917a5acd9bda5aca0
                      • Instruction Fuzzy Hash: 180168366192804FC326773898654693B72DB83305B1548FFD441CF367CB3A5C0AC762
                      Memory Dump Source
                      • Source File: 00000002.00000002.4479363112.00000000010D0000.00000040.00000020.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_10d0000_server.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 05e341044eeea330033e0b0b48c132283bb907ee6944466debd63c0f5c38532b
                      • Instruction ID: 94eca284ce6d03880d8192ea7eb447b7177e7507869b04929bb9a9574bc9b2bf
                      • Opcode Fuzzy Hash: 05e341044eeea330033e0b0b48c132283bb907ee6944466debd63c0f5c38532b
                      • Instruction Fuzzy Hash: 7111D230604380DFD311CB14D581B25BBE5AB89708F24C9ACE5CD4B647C73BD802CA91
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480586343.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4ec0000_server.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d1148ed3f5139a9d1661cd2389328f176c6a85937dac9f9173a146a359fb97fc
                      • Instruction ID: 7bcbf57eadd58dc96f284df4403cd734a027082bf4ecfe68ed15cb51cca7f62a
                      • Opcode Fuzzy Hash: d1148ed3f5139a9d1661cd2389328f176c6a85937dac9f9173a146a359fb97fc
                      • Instruction Fuzzy Hash: 5711E331E00205CFCB14DB78D80559DB7F6EFA925472085BDC409E7350EB359E02CB90
                      Memory Dump Source
                      • Source File: 00000002.00000002.4479363112.00000000010D0000.00000040.00000020.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_10d0000_server.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 875761ed14d39cbe9dc7b1da6eb17d87bfaecd953bbea7fc69f21d1282fdbf08
                      • Instruction ID: e42be5ab7efe053fcd818414074947c1fd6395d9737c249f3e6dc8da8b45b1eb
                      • Opcode Fuzzy Hash: 875761ed14d39cbe9dc7b1da6eb17d87bfaecd953bbea7fc69f21d1282fdbf08
                      • Instruction Fuzzy Hash: 7F215C3550D7C09FD713CB24D951B11BFB1AB46604F298ADAE4888B6A3C33A9816DB92
                      Memory Dump Source
                      • Source File: 00000002.00000002.4478435778.0000000000CEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CEA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_cea000_server.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: eebae4b7048f1108d0ed0c1b2eb81db09a774ce3cea99a1b68c79ed3662a0bb9
                      • Instruction ID: e0e988d7f678ee53cd635fb664c29d4f31bd2ad31aaf7f1468d3d29f44513f42
                      • Opcode Fuzzy Hash: eebae4b7048f1108d0ed0c1b2eb81db09a774ce3cea99a1b68c79ed3662a0bb9
                      • Instruction Fuzzy Hash: 7B11BEB5608301AFD350CF19DD41E57FBE8EB88660F04896EF95997311D271E9088FA2
                      Memory Dump Source
                      • Source File: 00000002.00000002.4479363112.00000000010D0000.00000040.00000020.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_10d0000_server.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e7ccb594882f6fb9e45056dc0dbb01d9c0ec9528f6000dcb874bb2f5d5c9005b
                      • Instruction ID: 0b0484a210cd66fa469b2c5561a2333c9465a7c050d7350761a3026d833b311c
                      • Opcode Fuzzy Hash: e7ccb594882f6fb9e45056dc0dbb01d9c0ec9528f6000dcb874bb2f5d5c9005b
                      • Instruction Fuzzy Hash: E601DB755083805FD3118B19AC418D3BFE8DF47230B0984ABE8488B612D175B909CB72
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480586343.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4ec0000_server.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1a7e23522dce505fe1f7a8be150da1e88288745353638b3bc367678122f91fea
                      • Instruction ID: 9a1b44147c0cd35d66e26bd5d8a860eeaf9b900cd7e7ec97487323d987d75ef9
                      • Opcode Fuzzy Hash: 1a7e23522dce505fe1f7a8be150da1e88288745353638b3bc367678122f91fea
                      • Instruction Fuzzy Hash: A8118E30605286CFCF14EBB8D99995C7BE1EF95308B00886EE046CB769DB34A809DB53
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480586343.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4ec0000_server.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2c7ada26a0c2913ab14f867176111be7fbfd34e5fbccee8583edf1ed77cccb18
                      • Instruction ID: 2860d9a389f4a8af586c4bad7c8fb77a5db7e2252d73c32b1bc6892a7be2724b
                      • Opcode Fuzzy Hash: 2c7ada26a0c2913ab14f867176111be7fbfd34e5fbccee8583edf1ed77cccb18
                      • Instruction Fuzzy Hash: 72F0F632A04344AFEB14DFB0C852BAE7F729F81724F1086AEE5419B1D1DA765942C780
                      Memory Dump Source
                      • Source File: 00000002.00000002.4479363112.00000000010D0000.00000040.00000020.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_10d0000_server.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e98923c3d1ea22da9be8346e03fd0310872bdf3a94fd5444d8394cfb273c2f72
                      • Instruction ID: 12b97a2f1adff6facb3a62f27a24f9f8115feb6f915b4d9cd65d0d4a15e22550
                      • Opcode Fuzzy Hash: e98923c3d1ea22da9be8346e03fd0310872bdf3a94fd5444d8394cfb273c2f72
                      • Instruction Fuzzy Hash: 82F0FB35144644DFC206CB14D540B15FBA2FB89718F24CAA9E9891B656C737E812DB81
                      Memory Dump Source
                      • Source File: 00000002.00000002.4479363112.00000000010D0000.00000040.00000020.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_10d0000_server.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 10c126e2187f11271540913a29e83965bc3e6756db78f97f61bcc8baee87e894
                      • Instruction ID: 7ad310e70b2140d9243a6081c82a707b81068564ae83132bddd94a145c48be4a
                      • Opcode Fuzzy Hash: 10c126e2187f11271540913a29e83965bc3e6756db78f97f61bcc8baee87e894
                      • Instruction Fuzzy Hash: F2E092B66046004B9650CF0AED414A2F7D8EB88630708C47FDC0D8B701D275F508CFA6
                      Memory Dump Source
                      • Source File: 00000002.00000002.4478435778.0000000000CEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CEA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_cea000_server.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c64d1e74c519d8570716e692c88f7401423de8eed875aefe75434467fed24fbf
                      • Instruction ID: 3827bd4ae4b9ab9db666e8f628a2113f2884cb7d2fa668e95170382083071b6b
                      • Opcode Fuzzy Hash: c64d1e74c519d8570716e692c88f7401423de8eed875aefe75434467fed24fbf
                      • Instruction Fuzzy Hash: D8E0D8B254020467D2108F06AC45F62F798DB44A31F04C56BEE085B701D171B5048EF2
                      Memory Dump Source
                      • Source File: 00000002.00000002.4484892439.0000000007270000.00000040.00000800.00020000.00000000.sdmp, Offset: 07270000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_7270000_server.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 954b5a5e5f474be0a72f281719a61ba5744ac61716b343a0d3b60d67bec0fe28
                      • Instruction ID: 02715ac0fcc26f8c8ba46414dfc5621618a93b18af549338d0a81e70986d90ae
                      • Opcode Fuzzy Hash: 954b5a5e5f474be0a72f281719a61ba5744ac61716b343a0d3b60d67bec0fe28
                      • Instruction Fuzzy Hash: D3E0D8B290020067D2109F06AC45F63FB98DB44A30F04C567EE095B701D172B514CEF2
                      Memory Dump Source
                      • Source File: 00000002.00000002.4484892439.0000000007270000.00000040.00000800.00020000.00000000.sdmp, Offset: 07270000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_7270000_server.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9fb0950c73f984fb8c258f11d49fa5bf49b9d44d9d564e4ae77530dc329dd1b3
                      • Instruction ID: 1bc2ed493755fcfe151af75456b0b62eb62b4910c0e4c7b15af93320fe1dc2e3
                      • Opcode Fuzzy Hash: 9fb0950c73f984fb8c258f11d49fa5bf49b9d44d9d564e4ae77530dc329dd1b3
                      • Instruction Fuzzy Hash: 73E0D8B254030067D2108F06AC46F62FB98DB44A31F04C567ED085B741D171B5148AF2
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480586343.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4ec0000_server.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: aff02c589e76992daad3e32b0d0d5a0f302f7af124a75f16dc853351454d8dec
                      • Instruction ID: 71580386b57e8312fe23931edcbed9251fea9fcdccf09c377baaccbe3f173b47
                      • Opcode Fuzzy Hash: aff02c589e76992daad3e32b0d0d5a0f302f7af124a75f16dc853351454d8dec
                      • Instruction Fuzzy Hash: 2AE08C3011A380CFC71A9B3494958483F73AF0A30A36408FEC046CB7A2C67BA847CB10
                      Memory Dump Source
                      • Source File: 00000002.00000002.4480586343.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_4ec0000_server.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 284917ec36fc372b2012e78cfae39a6d0c6d1c026e3a604003dc17b2ee5d5d02
                      • Instruction ID: 1caa75c504612ae9b10884ca55b7dac75b53b505bb11b993805c85b2d78fc864
                      • Opcode Fuzzy Hash: 284917ec36fc372b2012e78cfae39a6d0c6d1c026e3a604003dc17b2ee5d5d02
                      • Instruction Fuzzy Hash: 33E012318193889FCB06DF7499956EC7F74AF12310F2041EED85A97662D6354E1DCF41
                      Memory Dump Source
                      • Source File: 00000002.00000002.4478306417.0000000000CD2000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CD2000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_cd2000_server.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 49e0bbab8c6ff50c6073c7420aefd6e81b462720d0abc458fb992b463a9c4de4
                      • Instruction ID: 71ae5e7df067b1e61b74b0eca0ceb13eb8bdee18067cb97a52443c825f30d293
                      • Opcode Fuzzy Hash: 49e0bbab8c6ff50c6073c7420aefd6e81b462720d0abc458fb992b463a9c4de4
                      • Instruction Fuzzy Hash: 46D05E792056D14FD3279A1CC6A4B9537D4AB61714F4A44FBAC00CB763C768DA81E600
                      Memory Dump Source
                      • Source File: 00000002.00000002.4478306417.0000000000CD2000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CD2000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_cd2000_server.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a9d77e4b0568f4b573d8c306273bb0d0f14a2dbedcd09c879ca6e15ed327a4fb
                      • Instruction ID: 0babfc483c82a5e54c4ec4676cb20da35b4333c1e522332d710ae51eb292fa0c
                      • Opcode Fuzzy Hash: a9d77e4b0568f4b573d8c306273bb0d0f14a2dbedcd09c879ca6e15ed327a4fb
                      • Instruction Fuzzy Hash: F9D05E342002814FC725DA0CC2D4F5937D8AB90714F1A44E9AC208B772C7A8D9C1DA00