Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
JawnEmT6S2.exe

Overview

General Information

Sample name:JawnEmT6S2.exe
renamed because original name is a hash value
Original sample name:59bc430c7e94eda88ba59fc1fa3d2c0c.exe
Analysis ID:1432441
MD5:59bc430c7e94eda88ba59fc1fa3d2c0c
SHA1:7af6f4bd5d7c38ad87432785344f3016e873b151
SHA256:3477c51b4db8004874eeb950fced5e89d636b4ad123595ca403f8fca5c430498
Tags:exenjratRAT
Infos:

Detection

Njrat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected Njrat
.NET source code contains potential unpacker
Contains functionality to disable the Task Manager (.Net Source)
Contains functionality to spread to USB devices (.Net source)
Creates autorun.inf (USB autostart)
Disables zone checking for all users
Drops PE files to the startup folder
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies the windows firewall
Uses netsh to modify the Windows network and firewall settings
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May infect USB drives
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Startup Folder File Write
Stores files to the Windows start menu directory
Uses 32bit PE files
Yara signature match

Classification

  • System is w10x64
  • JawnEmT6S2.exe (PID: 6596 cmdline: "C:\Users\user\Desktop\JawnEmT6S2.exe" MD5: 59BC430C7E94EDA88BA59FC1FA3D2C0C)
    • server.exe (PID: 5460 cmdline: "C:\Users\user\AppData\Local\Temp\server.exe" MD5: 59BC430C7E94EDA88BA59FC1FA3D2C0C)
      • netsh.exe (PID: 6292 cmdline: netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\server.exe" "server.exe" ENABLE MD5: 4E89A1A088BE715D6C946E55AB07C7DF)
        • conhost.exe (PID: 6284 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
NjRATRedPacket Security describes NJRat as "a remote access trojan (RAT) has capabilities to log keystrokes, access the victim's camera, steal credentials stored in browsers, open a reverse shell, upload/download files, view the victim's desktop, perform process, file, and registry manipulations, and capabilities to let the attacker update, uninstall, restart, close, disconnect the RAT and rename its campaign ID. Through the Command & Control (CnC) server software, the attacker has capabilities to create and configure the malware to spread through USB drives."It is supposedly popular with actors in the Middle East. Similar to other RATs, many leaked builders may be backdoored.
  • AQUATIC PANDA
  • Earth Lusca
  • Operation C-Major
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.njrat
{"Campaign ID": "HacKed", "Version": "0.7d", "Install Name": "bd45e682ad8a06dcb9168f1be41d3129", "Install Dir": "system", "Registry Value": "Software\\Microsoft\\Windows\\CurrentVersion\\Run", "Network Seprator": "|'|'|"}
SourceRuleDescriptionAuthorStrings
JawnEmT6S2.exeJoeSecurity_NjratYara detected NjratJoe Security
    JawnEmT6S2.exeWindows_Trojan_Njrat_30f3c220unknownunknown
    • 0x115d2:$a1: get_Registry
    • 0x159f3:$a2: SEE_MASK_NOZONECHECKS
    • 0x15695:$a3: Download ERROR
    • 0x15c45:$a4: cmd.exe /c ping 0 -n 2 & del "
    • 0x13bd2:$a5: netsh firewall delete allowedprogram "
    JawnEmT6S2.exeCN_disclosed_20180208_cDetects malware from disclosed CN malware setFlorian Roth
    • 0x15c45:$x1: cmd.exe /c ping 0 -n 2 & del "
    • 0x1375e:$s1: winmgmts:\\.\root\SecurityCenter2
    • 0x156b3:$s3: Executed As
    • 0x124f0:$s5: Stub.exe
    • 0x15695:$s6: Download ERROR
    • 0x13720:$s8: Select * From AntiVirusProduct
    JawnEmT6S2.exeNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
    • 0x159f3:$reg: SEE_MASK_NOZONECHECKS
    • 0x15679:$msg: Execute ERROR
    • 0x156cd:$msg: Execute ERROR
    • 0x15c45:$ping: cmd.exe /c ping 0 -n 2 & del
    JawnEmT6S2.exeMALWARE_Win_NjRATDetects NjRAT / BladabindiditekSHen
    • 0x13bd2:$s1: netsh firewall delete allowedprogram
    • 0x13c24:$s2: netsh firewall add allowedprogram
    • 0x15c45:$s3: 63 00 6D 00 64 00 2E 00 65 00 78 00 65 00 20 00 2F 00 63 00 20 00 70 00 69 00 6E 00 67
    • 0x15679:$s4: Execute ERROR
    • 0x156cd:$s4: Execute ERROR
    • 0x15695:$s5: Download ERROR
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\AppData\Local\Temp\server.exeJoeSecurity_NjratYara detected NjratJoe Security
      C:\Users\user\AppData\Local\Temp\server.exeWindows_Trojan_Njrat_30f3c220unknownunknown
      • 0x115d2:$a1: get_Registry
      • 0x159f3:$a2: SEE_MASK_NOZONECHECKS
      • 0x15695:$a3: Download ERROR
      • 0x15c45:$a4: cmd.exe /c ping 0 -n 2 & del "
      • 0x13bd2:$a5: netsh firewall delete allowedprogram "
      C:\Users\user\AppData\Local\Temp\server.exeCN_disclosed_20180208_cDetects malware from disclosed CN malware setFlorian Roth
      • 0x15c45:$x1: cmd.exe /c ping 0 -n 2 & del "
      • 0x1375e:$s1: winmgmts:\\.\root\SecurityCenter2
      • 0x156b3:$s3: Executed As
      • 0x124f0:$s5: Stub.exe
      • 0x15695:$s6: Download ERROR
      • 0x13720:$s8: Select * From AntiVirusProduct
      C:\Users\user\AppData\Local\Temp\server.exeNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
      • 0x159f3:$reg: SEE_MASK_NOZONECHECKS
      • 0x15679:$msg: Execute ERROR
      • 0x156cd:$msg: Execute ERROR
      • 0x15c45:$ping: cmd.exe /c ping 0 -n 2 & del
      C:\Users\user\AppData\Local\Temp\server.exeMALWARE_Win_NjRATDetects NjRAT / BladabindiditekSHen
      • 0x13bd2:$s1: netsh firewall delete allowedprogram
      • 0x13c24:$s2: netsh firewall add allowedprogram
      • 0x15c45:$s3: 63 00 6D 00 64 00 2E 00 65 00 78 00 65 00 20 00 2F 00 63 00 20 00 70 00 69 00 6E 00 67
      • 0x15679:$s4: Execute ERROR
      • 0x156cd:$s4: Execute ERROR
      • 0x15695:$s5: Download ERROR
      Click to see the 15 entries
      SourceRuleDescriptionAuthorStrings
      00000000.00000000.1620882363.0000000000502000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_NjratYara detected NjratJoe Security
        00000000.00000000.1620882363.0000000000502000.00000002.00000001.01000000.00000003.sdmpWindows_Trojan_Njrat_30f3c220unknownunknown
        • 0x113d2:$a1: get_Registry
        • 0x157f3:$a2: SEE_MASK_NOZONECHECKS
        • 0x15495:$a3: Download ERROR
        • 0x15a45:$a4: cmd.exe /c ping 0 -n 2 & del "
        • 0x139d2:$a5: netsh firewall delete allowedprogram "
        00000000.00000000.1620882363.0000000000502000.00000002.00000001.01000000.00000003.sdmpNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
        • 0x157f3:$reg: SEE_MASK_NOZONECHECKS
        • 0x15479:$msg: Execute ERROR
        • 0x154cd:$msg: Execute ERROR
        • 0x15a45:$ping: cmd.exe /c ping 0 -n 2 & del
        00000000.00000002.1663600842.0000000003AC8000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_NjratYara detected NjratJoe Security
          00000000.00000002.1663600842.0000000003AC8000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Njrat_30f3c220unknownunknown
          • 0x115f2:$a1: get_Registry
          • 0x15a13:$a2: SEE_MASK_NOZONECHECKS
          • 0x156b5:$a3: Download ERROR
          • 0x15c65:$a4: cmd.exe /c ping 0 -n 2 & del "
          • 0x13bf2:$a5: netsh firewall delete allowedprogram "
          Click to see the 4 entries
          SourceRuleDescriptionAuthorStrings
          0.0.JawnEmT6S2.exe.500000.0.unpackJoeSecurity_NjratYara detected NjratJoe Security
            0.0.JawnEmT6S2.exe.500000.0.unpackWindows_Trojan_Njrat_30f3c220unknownunknown
            • 0x115d2:$a1: get_Registry
            • 0x159f3:$a2: SEE_MASK_NOZONECHECKS
            • 0x15695:$a3: Download ERROR
            • 0x15c45:$a4: cmd.exe /c ping 0 -n 2 & del "
            • 0x13bd2:$a5: netsh firewall delete allowedprogram "
            0.0.JawnEmT6S2.exe.500000.0.unpackCN_disclosed_20180208_cDetects malware from disclosed CN malware setFlorian Roth
            • 0x15c45:$x1: cmd.exe /c ping 0 -n 2 & del "
            • 0x1375e:$s1: winmgmts:\\.\root\SecurityCenter2
            • 0x156b3:$s3: Executed As
            • 0x124f0:$s5: Stub.exe
            • 0x15695:$s6: Download ERROR
            • 0x13720:$s8: Select * From AntiVirusProduct
            0.0.JawnEmT6S2.exe.500000.0.unpackNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
            • 0x159f3:$reg: SEE_MASK_NOZONECHECKS
            • 0x15679:$msg: Execute ERROR
            • 0x156cd:$msg: Execute ERROR
            • 0x15c45:$ping: cmd.exe /c ping 0 -n 2 & del
            0.0.JawnEmT6S2.exe.500000.0.unpackMALWARE_Win_NjRATDetects NjRAT / BladabindiditekSHen
            • 0x13bd2:$s1: netsh firewall delete allowedprogram
            • 0x13c24:$s2: netsh firewall add allowedprogram
            • 0x15c45:$s3: 63 00 6D 00 64 00 2E 00 65 00 78 00 65 00 20 00 2F 00 63 00 20 00 70 00 69 00 6E 00 67
            • 0x15679:$s4: Execute ERROR
            • 0x156cd:$s4: Execute ERROR
            • 0x15695:$s5: Download ERROR

            System Summary

            barindex
            Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\server.exe, ProcessId: 5460, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Epic Games.exe
            Timestamp:04/27/24-04:38:38.307737
            SID:2033132
            Source Port:49738
            Destination Port:10250
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:04/27/24-04:40:41.338997
            SID:2814856
            Source Port:49739
            Destination Port:10250
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:04/27/24-04:40:41.169696
            SID:2033132
            Source Port:49739
            Destination Port:10250
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:04/27/24-04:37:16.009989
            SID:2814860
            Source Port:49730
            Destination Port:10250
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:04/27/24-04:37:16.009989
            SID:2825564
            Source Port:49730
            Destination Port:10250
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:04/27/24-04:40:47.691759
            SID:2825564
            Source Port:49739
            Destination Port:10250
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:04/27/24-04:38:38.479153
            SID:2814856
            Source Port:49738
            Destination Port:10250
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:04/27/24-04:40:47.691759
            SID:2814860
            Source Port:49739
            Destination Port:10250
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:04/27/24-04:37:07.124534
            SID:2814856
            Source Port:49730
            Destination Port:10250
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:04/27/24-04:37:06.953679
            SID:2033132
            Source Port:49730
            Destination Port:10250
            Protocol:TCP
            Classtype:A Network Trojan was detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: JawnEmT6S2.exeAvira: detected
            Source: C:\Umbrella.flv.exeAvira: detection malicious, Label: TR/Dropper.Gen
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bd45e682ad8a06dcb9168f1be41d3129Epic Games.exeAvira: detection malicious, Label: TR/Dropper.Gen
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Epic Games.exeAvira: detection malicious, Label: TR/Dropper.Gen
            Source: C:\Users\user\AppData\Local\Temp\server.exeAvira: detection malicious, Label: TR/Dropper.Gen
            Source: 0.0.JawnEmT6S2.exe.500000.0.unpackMalware Configuration Extractor: Njrat {"Campaign ID": "HacKed", "Version": "0.7d", "Install Name": "bd45e682ad8a06dcb9168f1be41d3129", "Install Dir": "system", "Registry Value": "Software\\Microsoft\\Windows\\CurrentVersion\\Run", "Network Seprator": "|'|'|"}
            Source: 7.tcp.eu.ngrok.ioVirustotal: Detection: 14%Perma Link
            Source: C:\Umbrella.flv.exeReversingLabs: Detection: 84%
            Source: C:\Umbrella.flv.exeVirustotal: Detection: 70%Perma Link
            Source: C:\Users\user\AppData\Local\Temp\server.exeReversingLabs: Detection: 84%
            Source: C:\Users\user\AppData\Local\Temp\server.exeVirustotal: Detection: 70%Perma Link
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Epic Games.exeReversingLabs: Detection: 84%
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Epic Games.exeVirustotal: Detection: 70%Perma Link
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bd45e682ad8a06dcb9168f1be41d3129Epic Games.exeReversingLabs: Detection: 84%
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bd45e682ad8a06dcb9168f1be41d3129Epic Games.exeVirustotal: Detection: 70%Perma Link
            Source: JawnEmT6S2.exeReversingLabs: Detection: 84%
            Source: JawnEmT6S2.exeVirustotal: Detection: 70%Perma Link
            Source: Yara matchFile source: JawnEmT6S2.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.JawnEmT6S2.exe.500000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.1620882363.0000000000502000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1663600842.0000000003AC8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.4103059609.00000000026F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: JawnEmT6S2.exe PID: 6596, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: server.exe PID: 5460, type: MEMORYSTR
            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\server.exe, type: DROPPED
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Epic Games.exe, type: DROPPED
            Source: Yara matchFile source: C:\Umbrella.flv.exe, type: DROPPED
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bd45e682ad8a06dcb9168f1be41d3129Epic Games.exe, type: DROPPED
            Source: C:\Umbrella.flv.exeJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bd45e682ad8a06dcb9168f1be41d3129Epic Games.exeJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Epic Games.exeJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Local\Temp\server.exeJoe Sandbox ML: detected
            Source: JawnEmT6S2.exeJoe Sandbox ML: detected
            Source: JawnEmT6S2.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
            Source: JawnEmT6S2.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Spreading

            barindex
            Source: JawnEmT6S2.exe, Usb1.cs.Net Code: infect
            Source: server.exe.0.dr, Usb1.cs.Net Code: infect
            Source: Epic Games.exe.1.dr, Usb1.cs.Net Code: infect
            Source: bd45e682ad8a06dcb9168f1be41d3129Epic Games.exe.1.dr, Usb1.cs.Net Code: infect
            Source: Umbrella.flv.exe.1.dr, Usb1.cs.Net Code: infect
            Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\autorun.infJump to behavior
            Source: JawnEmT6S2.exe, 00000000.00000000.1620882363.0000000000502000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: \autorun.inf
            Source: JawnEmT6S2.exe, 00000000.00000000.1620882363.0000000000502000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: [autorun]
            Source: JawnEmT6S2.exe, 00000000.00000000.1620882363.0000000000502000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: autorun.inf
            Source: JawnEmT6S2.exe, 00000000.00000002.1663600842.0000000003AC8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \autorun.inf
            Source: JawnEmT6S2.exe, 00000000.00000002.1663600842.0000000003AC8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: [autorun]
            Source: JawnEmT6S2.exe, 00000000.00000002.1663600842.0000000003AC8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: autorun.inf
            Source: server.exe, 00000001.00000002.4103059609.00000000026F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \autorun.inf
            Source: server.exe, 00000001.00000002.4103059609.00000000026F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: [autorun]
            Source: server.exe, 00000001.00000002.4103059609.00000000026F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: autorun.inf$OJk
            Source: JawnEmT6S2.exeBinary or memory string: \autorun.inf
            Source: JawnEmT6S2.exeBinary or memory string: [autorun]
            Source: JawnEmT6S2.exeBinary or memory string: autorun.inf
            Source: autorun.inf.1.drBinary or memory string: [autorun]
            Source: Umbrella.flv.exe.1.drBinary or memory string: \autorun.inf
            Source: Umbrella.flv.exe.1.drBinary or memory string: [autorun]
            Source: Umbrella.flv.exe.1.drBinary or memory string: autorun.inf
            Source: bd45e682ad8a06dcb9168f1be41d3129Epic Games.exe.1.drBinary or memory string: \autorun.inf
            Source: bd45e682ad8a06dcb9168f1be41d3129Epic Games.exe.1.drBinary or memory string: [autorun]
            Source: bd45e682ad8a06dcb9168f1be41d3129Epic Games.exe.1.drBinary or memory string: autorun.inf
            Source: Epic Games.exe.1.drBinary or memory string: \autorun.inf
            Source: Epic Games.exe.1.drBinary or memory string: [autorun]
            Source: Epic Games.exe.1.drBinary or memory string: autorun.inf
            Source: server.exe.0.drBinary or memory string: \autorun.inf
            Source: server.exe.0.drBinary or memory string: [autorun]
            Source: server.exe.0.drBinary or memory string: autorun.inf

            Networking

            barindex
            Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49730 -> 3.125.188.168:10250
            Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49730 -> 3.125.188.168:10250
            Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.4:49730 -> 3.125.188.168:10250
            Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.4:49730 -> 3.125.188.168:10250
            Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49738 -> 3.124.67.191:10250
            Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49738 -> 3.124.67.191:10250
            Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49739 -> 3.124.67.191:10250
            Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49739 -> 3.124.67.191:10250
            Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.4:49739 -> 3.124.67.191:10250
            Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.4:49739 -> 3.124.67.191:10250
            Source: global trafficTCP traffic: 192.168.2.4:49730 -> 3.125.188.168:10250
            Source: global trafficTCP traffic: 192.168.2.4:49738 -> 3.124.67.191:10250
            Source: Joe Sandbox ViewIP Address: 3.125.188.168 3.125.188.168
            Source: Joe Sandbox ViewIP Address: 3.124.67.191 3.124.67.191
            Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
            Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficDNS traffic detected: DNS query: 7.tcp.eu.ngrok.io
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

            E-Banking Fraud

            barindex
            Source: Yara matchFile source: JawnEmT6S2.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.JawnEmT6S2.exe.500000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.1620882363.0000000000502000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1663600842.0000000003AC8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.4103059609.00000000026F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: JawnEmT6S2.exe PID: 6596, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: server.exe PID: 5460, type: MEMORYSTR
            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\server.exe, type: DROPPED
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Epic Games.exe, type: DROPPED
            Source: Yara matchFile source: C:\Umbrella.flv.exe, type: DROPPED
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bd45e682ad8a06dcb9168f1be41d3129Epic Games.exe, type: DROPPED

            System Summary

            barindex
            Source: JawnEmT6S2.exe, type: SAMPLEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
            Source: JawnEmT6S2.exe, type: SAMPLEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: JawnEmT6S2.exe, type: SAMPLEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: JawnEmT6S2.exe, type: SAMPLEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: 0.0.JawnEmT6S2.exe.500000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
            Source: 0.0.JawnEmT6S2.exe.500000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: 0.0.JawnEmT6S2.exe.500000.0.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 0.0.JawnEmT6S2.exe.500000.0.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: 00000000.00000000.1620882363.0000000000502000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
            Source: 00000000.00000000.1620882363.0000000000502000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 00000000.00000002.1663600842.0000000003AC8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
            Source: 00000000.00000002.1663600842.0000000003AC8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: C:\Users\user\AppData\Local\Temp\server.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
            Source: C:\Users\user\AppData\Local\Temp\server.exe, type: DROPPEDMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: C:\Users\user\AppData\Local\Temp\server.exe, type: DROPPEDMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: C:\Users\user\AppData\Local\Temp\server.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Epic Games.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Epic Games.exe, type: DROPPEDMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Epic Games.exe, type: DROPPEDMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Epic Games.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Umbrella.flv.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
            Source: C:\Umbrella.flv.exe, type: DROPPEDMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: C:\Umbrella.flv.exe, type: DROPPEDMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: C:\Umbrella.flv.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bd45e682ad8a06dcb9168f1be41d3129Epic Games.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bd45e682ad8a06dcb9168f1be41d3129Epic Games.exe, type: DROPPEDMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bd45e682ad8a06dcb9168f1be41d3129Epic Games.exe, type: DROPPEDMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bd45e682ad8a06dcb9168f1be41d3129Epic Games.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess Stats: CPU usage > 49%
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeCode function: 0_2_04CD42980_2_04CD4298
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeCode function: 0_2_04CD45440_2_04CD4544
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeCode function: 0_2_04CD505D0_2_04CD505D
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeCode function: 0_2_04CD4B5B0_2_04CD4B5B
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeCode function: 0_2_04CD47D40_2_04CD47D4
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeCode function: 0_2_04CD536F0_2_04CD536F
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeCode function: 0_2_04CD50E30_2_04CD50E3
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeCode function: 0_2_04CD49F90_2_04CD49F9
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeCode function: 0_2_04CD44F10_2_04CD44F1
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeCode function: 0_2_04CD428F0_2_04CD428F
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeCode function: 0_2_04CD470F0_2_04CD470F
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeCode function: 0_2_04CD4C8F0_2_04CD4C8F
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeCode function: 0_2_04CD50000_2_04CD5000
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeCode function: 0_2_04CD4F9D0_2_04CD4F9D
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeCode function: 0_2_04CD499D0_2_04CD499D
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeCode function: 0_2_04CD4F2F0_2_04CD4F2F
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeCode function: 0_2_04CD49360_2_04CD4936
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeCode function: 0_2_04CD46300_2_04CD4630
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeCode function: 0_2_04CD54590_2_04CD5459
            Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 1_2_009128071_2_00912807
            Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 1_2_0091247C1_2_0091247C
            Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 1_2_009126E71_2_009126E7
            Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 1_2_00BF42981_2_00BF4298
            Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 1_2_00BF499D1_2_00BF499D
            Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 1_2_00BF49F91_2_00BF49F9
            Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 1_2_00BF44F11_2_00BF44F1
            Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 1_2_00BF47D41_2_00BF47D4
            Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 1_2_00BF49361_2_00BF4936
            Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 1_2_00BF46301_2_00BF4630
            Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 1_2_00BF470F1_2_00BF470F
            Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 1_2_00BF42691_2_00BF4269
            Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 1_2_00BF4B5B1_2_00BF4B5B
            Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 1_2_00BF45441_2_00BF4544
            Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 1_2_00BF4F9D1_2_00BF4F9D
            Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 1_2_00BF4C8F1_2_00BF4C8F
            Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 1_2_00BF50E31_2_00BF50E3
            Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 1_2_00BF4F2F1_2_00BF4F2F
            Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 1_2_00BF50001_2_00BF5000
            Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 1_2_00BF536F1_2_00BF536F
            Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 1_2_00BF505D1_2_00BF505D
            Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 1_2_00BF54591_2_00BF5459
            Source: JawnEmT6S2.exe, 00000000.00000002.1662752187.0000000000C0E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs JawnEmT6S2.exe
            Source: JawnEmT6S2.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: JawnEmT6S2.exe, type: SAMPLEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
            Source: JawnEmT6S2.exe, type: SAMPLEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: JawnEmT6S2.exe, type: SAMPLEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: JawnEmT6S2.exe, type: SAMPLEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: 0.0.JawnEmT6S2.exe.500000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
            Source: 0.0.JawnEmT6S2.exe.500000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.0.JawnEmT6S2.exe.500000.0.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 0.0.JawnEmT6S2.exe.500000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: 00000000.00000000.1620882363.0000000000502000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
            Source: 00000000.00000000.1620882363.0000000000502000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 00000000.00000002.1663600842.0000000003AC8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
            Source: 00000000.00000002.1663600842.0000000003AC8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: C:\Users\user\AppData\Local\Temp\server.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
            Source: C:\Users\user\AppData\Local\Temp\server.exe, type: DROPPEDMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: C:\Users\user\AppData\Local\Temp\server.exe, type: DROPPEDMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: C:\Users\user\AppData\Local\Temp\server.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Epic Games.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Epic Games.exe, type: DROPPEDMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Epic Games.exe, type: DROPPEDMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Epic Games.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Umbrella.flv.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
            Source: C:\Umbrella.flv.exe, type: DROPPEDMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: C:\Umbrella.flv.exe, type: DROPPEDMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: C:\Umbrella.flv.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bd45e682ad8a06dcb9168f1be41d3129Epic Games.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bd45e682ad8a06dcb9168f1be41d3129Epic Games.exe, type: DROPPEDMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bd45e682ad8a06dcb9168f1be41d3129Epic Games.exe, type: DROPPEDMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bd45e682ad8a06dcb9168f1be41d3129Epic Games.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: classification engineClassification label: mal100.spre.phis.troj.adwa.evad.winEXE@6/8@3/2
            Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 1_2_04FA00EA AdjustTokenPrivileges,1_2_04FA00EA
            Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 1_2_04FA00B3 AdjustTokenPrivileges,1_2_04FA00B3
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeFile created: C:\Users\user\AppData\Roaming\appJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeMutant created: NULL
            Source: C:\Users\user\AppData\Local\Temp\server.exeMutant created: \Sessions\1\BaseNamedObjects\bd45e682ad8a06dcb9168f1be41d3129
            Source: C:\Users\user\AppData\Local\Temp\server.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6284:120:WilError_03
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeFile created: C:\Users\user\AppData\Local\Temp\FransescoPast.txtJump to behavior
            Source: JawnEmT6S2.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: JawnEmT6S2.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: JawnEmT6S2.exeReversingLabs: Detection: 84%
            Source: JawnEmT6S2.exeVirustotal: Detection: 70%
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeFile read: C:\Users\user\Desktop\JawnEmT6S2.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\JawnEmT6S2.exe "C:\Users\user\Desktop\JawnEmT6S2.exe"
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeProcess created: C:\Users\user\AppData\Local\Temp\server.exe "C:\Users\user\AppData\Local\Temp\server.exe"
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\server.exe" "server.exe" ENABLE
            Source: C:\Windows\SysWOW64\netsh.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeProcess created: C:\Users\user\AppData\Local\Temp\server.exe "C:\Users\user\AppData\Local\Temp\server.exe" Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\server.exe" "server.exe" ENABLEJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeSection loaded: slc.dllJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ifmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasmontr.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mfc42u.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: authfwcfg.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpolicyiomgr.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: firewallapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcmonitor.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3cfg.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3api.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: onex.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappcfg.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappprxy.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwcfg.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: hnetmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netshell.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nlaapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netsetupapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netiohlp.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshhttp.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: httpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshipsec.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: activeds.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: polstore.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winipsec.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: adsldpc.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshwfp.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cabinet.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2pnetsh.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2p.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rpcnsh.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: whhelper.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlancfg.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlanapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wshelper.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wevtapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: peerdistsh.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wcmapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rmclient.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mobilenetworking.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: slc.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ktmw32.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprmsg.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dllJump to behavior
            Source: JawnEmT6S2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
            Source: JawnEmT6S2.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Data Obfuscation

            barindex
            Source: JawnEmT6S2.exe, Fransesco.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
            Source: server.exe.0.dr, Fransesco.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
            Source: Epic Games.exe.1.dr, Fransesco.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
            Source: bd45e682ad8a06dcb9168f1be41d3129Epic Games.exe.1.dr, Fransesco.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
            Source: Umbrella.flv.exe.1.dr, Fransesco.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeFile created: C:\Users\user\AppData\Local\Temp\server.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Umbrella.flv.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Epic Games.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bd45e682ad8a06dcb9168f1be41d3129Epic Games.exeJump to dropped file

            Boot Survival

            barindex
            Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Epic Games.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bd45e682ad8a06dcb9168f1be41d3129Epic Games.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Epic Games.exeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Epic Games.exeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bd45e682ad8a06dcb9168f1be41d3129Epic Games.exeJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeMemory allocated: EA0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeMemory allocated: 2AC0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeMemory allocated: 4AC0000 memory commit | memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeMemory allocated: 9B0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeMemory allocated: 26F0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeMemory allocated: B40000 memory commit | memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeWindow / User API: threadDelayed 906Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeWindow / User API: threadDelayed 5644Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeWindow / User API: threadDelayed 2858Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeWindow / User API: foregroundWindowGot 742Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeWindow / User API: foregroundWindowGot 726Jump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exe TID: 6772Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exe TID: 2140Thread sleep time: -90600s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exe TID: 6264Thread sleep time: -5644000s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exe TID: 6264Thread sleep time: -2858000s >= -30000sJump to behavior
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: JawnEmT6S2.exe, 00000000.00000002.1662752187.0000000000C89000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\5
            Source: server.exe, 00000001.00000002.4102168320.00000000004E8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllA6w
            Source: JawnEmT6S2.exe, 00000000.00000002.1662752187.0000000000C89000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}A
            Source: netsh.exe, 00000002.00000003.1707934872.0000000000C62000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllS
            Source: server.exe, 00000001.00000002.4102168320.00000000004E8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\JawnEmT6S2.exeProcess created: C:\Users\user\AppData\Local\Temp\server.exe "C:\Users\user\AppData\Local\Temp\server.exe" Jump to behavior
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 02:37:22 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 00:08:04 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 08:40:32 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 17:02:27 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 03:14:43 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 03:45:26 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 01:16:08 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 16:30:24 - Program Manager
            Source: server.exe, 00000001.00000002.4103059609.000000000291D000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4103059609.0000000002990000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4103059609.0000000002A41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 21:15:42 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 00:44:05 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 08:09:48 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 16:59:40 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 22:02:22 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 15:53:03 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 04:01:23 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 08:19:07 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 16:51:48 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 22:33:05 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 08:45:49 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 01:21:26 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 23:41:09 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 08:25:55 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 00:13:22 - Program Manager
            Source: server.exe, 00000001.00000002.4103059609.000000000291D000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4103059609.00000000028D7000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4103059609.0000000002C84000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 20:38:21 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 08:35:14 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 16:15:47 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 09:33:59 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 07:53:52 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 00:45:35 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 09:07:17 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 16:14:17 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 04:19:50 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 23:49:01 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 04:02:53 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 23:39:42 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 04:12:12 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 00:18:39 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 17:35:31 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 08:03:01 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 16:04:58 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 09:01:46 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 01:05:19 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 09:11:05 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 03:34:37 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 02:26:33 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 22:54:29 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 07:52:22 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 17:47:50 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 09:12:35 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 00:50:53 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 08:04:31 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 01:10:37 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 00:02:33 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 15:54:33 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 00:29:28 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 03:29:19 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 08:46:03 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 07:59:23 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 08:36:44 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 23:06:38 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 23:42:00 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 16:47:21 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 17:34:01 - Program Manager
            Source: server.exe, 00000001.00000002.4103059609.0000000002A41000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 21:19:29 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 01:59:47 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 03:23:48 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 03:03:54 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 03:46:56 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 02:15:44 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 03:13:13 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 16:06:42 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 02:48:11 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 04:11:58 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 02:38:52 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 04:21:17 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 09:08:47 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 02:41:10 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 07:57:39 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 02:31:51 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 23:22:45 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 03:33:07 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 15:52:49 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 17:45:29 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 22:45:24 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 02:40:19 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 16:37:25 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 16:58:49 - Program Manager
            Source: server.exe, 00000001.00000002.4103059609.000000000291D000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4103059609.00000000028D7000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4103059609.0000000002C84000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/27 | 04:39:29 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 16:41:13 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 17:39:18 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 01:07:40 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 17:08:35 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 00:14:52 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 01:01:32 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 01:22:56 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 08:08:18 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 00:57:54 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 14:44:08 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 04:17:29 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 01:38:23 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 03:09:25 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 23:10:26 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 02:46:27 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 15:29:21 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 13:52:11 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 23:59:36 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 01:54:30 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 08:24:25 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 10:04:26 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 23:53:28 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 03:25:32 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 22:49:48 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 01:06:10 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 23:12:10 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 03:12:59 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 01:08:33 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 00:11:38 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 15:51:19 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 09:07:54 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 09:17:13 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 01:32:52 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 22:56:13 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 14:45:38 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 16:53:32 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 22:46:54 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 14:28:38 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 04:07:31 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 23:54:58 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 23:05:45 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 16:36:32 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 23:15:04 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 08:58:22 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 08:02:47 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 04:19:13 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 17:46:59 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 08:12:06 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 04:09:54 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 16:38:55 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 16:48:14 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 22:59:07 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 00:39:24 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 03:55:22 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 15:00:42 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 01:47:28 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 22:39:13 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 23:52:35 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 16:16:01 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 08:52:51 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 00:34:09 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 01:55:23 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 23:17:27 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 01:58:17 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 16:59:03 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 16:40:20 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 22:44:31 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 23:41:46 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 17:43:06 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 08:47:33 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 23:18:57 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 23:28:16 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 17:09:28 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 03:48:40 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 16:35:02 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 02:31:14 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 16:25:43 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 08:13:36 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 22:55:59 - Program Manager
            Source: server.exe, 00000001.00000002.4103059609.000000000291D000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4103059609.00000000028D7000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4103059609.0000000002C84000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/27 | 16:29:28 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 02:20:25 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 03:08:32 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 01:12:21 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 04:16:36 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 08:15:59 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 16:57:19 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 09:23:24 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 10:25:11 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 02:12:50 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 15:39:56 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 23:21:15 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 17:01:34 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 03:30:13 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 04:18:59 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 15:49:15 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 17:13:16 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 23:48:47 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 03:44:33 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 17:03:57 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 16:40:59 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 07:54:45 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 16:05:12 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 15:42:14 - Program Manager
            Source: server.exe, 00000001.00000002.4103059609.000000000291D000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4103059609.00000000028D7000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4103059609.0000000002C84000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 20:59:08 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 01:19:22 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 00:56:24 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 01:43:41 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 02:47:57 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 03:59:09 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 17:05:41 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 02:51:45 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 01:49:12 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 23:43:30 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 01:53:00 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 01:39:53 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 00:09:34 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 09:10:12 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 07:50:38 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 22:48:18 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 16:44:07 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 16:34:48 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 02:49:41 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 23:09:52 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 15:36:03 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 07:56:09 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 02:59:00 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 23:13:40 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 16:20:28 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 23:19:11 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 07:48:34 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 22:50:42 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 23:58:06 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 08:45:10 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 23:11:56 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 01:51:16 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 22:38:59 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 00:43:12 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 17:15:00 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 01:17:38 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 16:52:02 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 17:29:20 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 00:33:53 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 08:07:25 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 17:14:09 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 23:57:13 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 09:15:29 - Program Manager
            Source: server.exe, 00000001.00000002.4103059609.000000000291D000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4103059609.00000000028D7000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4103059609.0000000002990000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 21:06:00 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 16:06:05 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 23:56:42 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 16:27:29 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 22:50:05 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 03:26:25 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 02:39:45 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 08:21:31 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 15:55:26 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 03:47:49 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 02:56:23 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 01:13:14 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 16:42:06 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 00:05:10 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 04:03:46 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 15:15:55 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 22:35:28 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 03:31:43 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 07:49:27 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 08:37:37 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 15:40:50 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 04:04:17 - Program Manager
            Source: server.exe, 00000001.00000002.4103059609.0000000002799000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 21:47:18 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 00:25:04 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 16:08:06 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 01:37:30 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 03:27:55 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 15:51:56 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 02:45:34 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 01:02:25 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 00:52:17 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 08:26:48 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 02:10:29 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 03:53:38 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 17:30:16 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 23:11:19 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 02:59:39 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 16:22:12 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 08:54:15 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 03:07:02 - Program Manager
            Source: Epic Games.exe.1.dr, server.exe.0.drBinary or memory string: Shell_traywnd+MostrarBarraDeTarefas
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 00:07:11 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 03:42:32 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 00:26:34 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 17:38:25 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 01:15:15 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 01:34:38 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 02:23:19 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 02:29:27 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 16:38:18 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 00:52:00 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 02:19:51 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 08:41:25 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 01:45:27 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 23:30:57 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 00:14:15 - Program Manager
            Source: server.exe, 00000001.00000002.4103059609.000000000291D000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4103059609.00000000028D7000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4103059609.0000000002C84000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 21:01:39 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 00:59:18 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 09:21:01 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 15:58:57 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 02:32:07 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 17:41:05 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 00:37:23 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 16:33:01 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 23:29:46 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 03:21:25 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 08:59:52 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 02:13:21 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 01:22:19 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 17:16:30 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 01:24:03 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 22:38:20 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 22:57:43 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 02:01:24 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 08:30:36 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 15:06:50 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 00:54:01 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 02:07:32 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 08:11:13 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 15:45:08 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 23:24:09 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 03:38:44 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 03:39:15 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 09:02:39 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 22:41:00 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 08:18:14 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 14:56:27 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 03:15:36 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 23:55:12 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 08:20:01 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 00:00:49 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 09:26:18 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 13:48:23 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 08:32:20 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 08:59:15 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 03:39:52 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 00:16:16 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 23:50:12 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 23:02:14 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 00:30:22 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 17:42:13 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 00:57:17 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 15:53:40 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 02:28:56 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 03:00:01 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 02:09:33 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 09:24:17 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 01:40:10 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 23:29:09 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 02:11:20 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 03:17:37 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 04:25:24 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 08:16:13 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 16:31:17 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 23:08:22 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 03:17:20 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 03:43:03 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 08:10:05 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 02:54:22 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 17:25:35 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 01:29:57 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 17:26:06 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 09:05:31 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 22:37:12 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 03:59:46 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 08:20:18 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 16:41:50 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 07:54:08 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 22:47:25 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 16:18:02 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 23:33:34 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 02:28:19 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 03:49:33 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 23:09:15 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 07:42:26 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 15:49:52 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 04:15:43 - Program Manager
            Source: server.exe, 00000001.00000002.4103059609.000000000291D000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4103059609.00000000028D7000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4103059609.0000000002990000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 21:13:58 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 08:49:34 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 01:25:11 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 16:54:03 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 03:19:21 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 15:03:58 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 01:56:16 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 23:55:29 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 03:43:40 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 00:48:12 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 17:06:12 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 02:18:38 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 15:43:07 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 02:12:13 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 22:57:06 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 08:17:21 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 00:18:00 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 03:40:48 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 14:22:50 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 23:14:11 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 02:32:44 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 01:50:23 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 13:57:28 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 03:16:29 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 23:44:23 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 00:15:08 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 16:57:56 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 15:30:54 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 17:40:12 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 22:51:13 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 03:48:57 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 02:05:48 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 00:58:25 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 16:43:14 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 04:05:30 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 00:20:04 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 08:39:21 - Program Manager
            Source: server.exe, 00000001.00000002.4103059609.000000000291D000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4103059609.00000000028D7000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4103059609.0000000002C84000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/27 | 12:07:13 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 16:17:31 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 07:57:00 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 02:43:33 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 08:58:39 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 01:57:24 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 23:42:39 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 16:02:57 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 02:55:15 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 03:51:37 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 22:46:17 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 03:53:21 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 01:19:39 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 22:58:14 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 13:47:30 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 08:06:32 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 17:05:04 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 23:56:05 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 17:36:24 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 09:14:36 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 17:17:01 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 14:33:19 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 21:26:31 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 02:19:14 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 00:23:57 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 09:13:28 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 03:32:14 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 23:23:16 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 03:04:47 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 22:48:01 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 03:06:31 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 03:52:45 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 09:37:07 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 03:30:50 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 15:39:19 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 08:05:24 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 03:28:26 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 22:56:50 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 02:44:41 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 08:29:03 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 03:22:01 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 08:31:07 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 15:18:32 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 16:07:13 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 23:13:03 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 01:35:09 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 08:53:22 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 00:46:28 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 16:50:55 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 16:26:36 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 00:03:26 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 17:15:17 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 23:19:28 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 00:27:05 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 09:16:20 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 02:41:49 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 15:42:51 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 01:09:26 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 00:51:24 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 01:33:45 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 17:13:53 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 01:14:22 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 00:25:41 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 21:24:47 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 16:48:51 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 08:41:03 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 15:08:14 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 00:20:41 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 07:54:23 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 16:16:18 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 22:50:59 - Program Manager
            Source: server.exe, 00000001.00000002.4103059609.000000000291D000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4103059609.00000000028D7000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4103059609.0000000002C84000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/27 | 16:47:36 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 08:10:20 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 22:58:51 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 04:13:59 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 23:03:07 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 16:08:28 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 03:05:55 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/29 | 23:09:30 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 01:02:03 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 17:32:39 - Program Manager
            Source: server.exe, 00000001.00000002.4103059609.000000000291D000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4103059609.00000000028D7000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4103059609.0000000002C84000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/27 | 16:39:46 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 16:24:35 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 01:56:31 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 16:21:36 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 08:00:09 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 08:02:30 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 01:15:37 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/02 | 08:54:37 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4104631856.000000000410C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/05/04 | 13:44:38 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 00:04:34 - Program Manager
            Source: server.exe, 00000001.00000002.4104631856.000000000370C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/04/30 | 02:10:07 - Program Manager
            Source: C:\Windows\SysWOW64\netsh.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Lowering of HIPS / PFW / Operating System Security Settings

            barindex
            Source: JawnEmT6S2.exe, Fransesco.cs.Net Code: INS
            Source: server.exe.0.dr, Fransesco.cs.Net Code: INS
            Source: Epic Games.exe.1.dr, Fransesco.cs.Net Code: INS
            Source: bd45e682ad8a06dcb9168f1be41d3129Epic Games.exe.1.dr, Fransesco.cs.Net Code: INS
            Source: Umbrella.flv.exe.1.dr, Fransesco.cs.Net Code: INS
            Source: C:\Users\user\AppData\Local\Temp\server.exeRegistry value created: HKEY_CURRENT_USER\Environment SEE_MASK_NOZONECHECKSJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\server.exe" "server.exe" ENABLE
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\server.exe" "server.exe" ENABLE

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: JawnEmT6S2.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.JawnEmT6S2.exe.500000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.1620882363.0000000000502000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1663600842.0000000003AC8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.4103059609.00000000026F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: JawnEmT6S2.exe PID: 6596, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: server.exe PID: 5460, type: MEMORYSTR
            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\server.exe, type: DROPPED
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Epic Games.exe, type: DROPPED
            Source: Yara matchFile source: C:\Umbrella.flv.exe, type: DROPPED
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bd45e682ad8a06dcb9168f1be41d3129Epic Games.exe, type: DROPPED

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: JawnEmT6S2.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.JawnEmT6S2.exe.500000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.1620882363.0000000000502000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1663600842.0000000003AC8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.4103059609.00000000026F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: JawnEmT6S2.exe PID: 6596, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: server.exe PID: 5460, type: MEMORYSTR
            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\server.exe, type: DROPPED
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Epic Games.exe, type: DROPPED
            Source: Yara matchFile source: C:\Umbrella.flv.exe, type: DROPPED
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bd45e682ad8a06dcb9168f1be41d3129Epic Games.exe, type: DROPPED
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire Infrastructure21
            Replication Through Removable Media
            Windows Management Instrumentation12
            Registry Run Keys / Startup Folder
            1
            Access Token Manipulation
            1
            Masquerading
            OS Credential Dumping11
            Security Software Discovery
            Remote Services1
            Archive Collected Data
            1
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/Job1
            DLL Side-Loading
            12
            Process Injection
            41
            Disable or Modify Tools
            LSASS Memory1
            Process Discovery
            Remote Desktop Protocol1
            Clipboard Data
            1
            Non-Standard Port
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)12
            Registry Run Keys / Startup Folder
            31
            Virtualization/Sandbox Evasion
            Security Account Manager31
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared Drive1
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
            DLL Side-Loading
            1
            Access Token Manipulation
            NTDS1
            Application Window Discovery
            Distributed Component Object ModelInput Capture1
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script12
            Process Injection
            LSA Secrets1
            Peripheral Device Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            Software Packing
            Cached Domain Credentials1
            File and Directory Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            DLL Side-Loading
            DCSync12
            System Information Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            JawnEmT6S2.exe84%ReversingLabsByteCode-MSIL.Backdoor.Bladabhindi
            JawnEmT6S2.exe71%VirustotalBrowse
            JawnEmT6S2.exe100%AviraTR/Dropper.Gen
            JawnEmT6S2.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Umbrella.flv.exe100%AviraTR/Dropper.Gen
            C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bd45e682ad8a06dcb9168f1be41d3129Epic Games.exe100%AviraTR/Dropper.Gen
            C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Epic Games.exe100%AviraTR/Dropper.Gen
            C:\Users\user\AppData\Local\Temp\server.exe100%AviraTR/Dropper.Gen
            C:\Umbrella.flv.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bd45e682ad8a06dcb9168f1be41d3129Epic Games.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Epic Games.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Local\Temp\server.exe100%Joe Sandbox ML
            C:\Umbrella.flv.exe84%ReversingLabsByteCode-MSIL.Backdoor.Bladabhindi
            C:\Umbrella.flv.exe71%VirustotalBrowse
            C:\Users\user\AppData\Local\Temp\server.exe84%ReversingLabsByteCode-MSIL.Backdoor.Bladabhindi
            C:\Users\user\AppData\Local\Temp\server.exe71%VirustotalBrowse
            C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Epic Games.exe84%ReversingLabsByteCode-MSIL.Backdoor.Bladabhindi
            C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Epic Games.exe71%VirustotalBrowse
            C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bd45e682ad8a06dcb9168f1be41d3129Epic Games.exe84%ReversingLabsByteCode-MSIL.Backdoor.Bladabhindi
            C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bd45e682ad8a06dcb9168f1be41d3129Epic Games.exe71%VirustotalBrowse
            No Antivirus matches
            SourceDetectionScannerLabelLink
            7.tcp.eu.ngrok.io14%VirustotalBrowse
            No Antivirus matches
            NameIPActiveMaliciousAntivirus DetectionReputation
            7.tcp.eu.ngrok.io
            3.125.188.168
            truetrueunknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            3.125.188.168
            7.tcp.eu.ngrok.ioUnited States
            16509AMAZON-02UStrue
            3.124.67.191
            unknownUnited States
            16509AMAZON-02UStrue
            Joe Sandbox version:40.0.0 Tourmaline
            Analysis ID:1432441
            Start date and time:2024-04-27 04:36:07 +02:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 7m 32s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:8
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:JawnEmT6S2.exe
            renamed because original name is a hash value
            Original Sample Name:59bc430c7e94eda88ba59fc1fa3d2c0c.exe
            Detection:MAL
            Classification:mal100.spre.phis.troj.adwa.evad.winEXE@6/8@3/2
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:
            • Successful, ratio: 98%
            • Number of executed functions: 130
            • Number of non-executed functions: 17
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Override analysis time to 240000 for current running targets taking high CPU consumption
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
            • Not all processes where analyzed, report is missing behavior information
            • Report size exceeded maximum capacity and may have missing disassembly code.
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.
            TimeTypeDescription
            03:37:06AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bd45e682ad8a06dcb9168f1be41d3129Epic Games.exe
            03:37:15AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Epic Games.exe
            04:37:43API Interceptor433558x Sleep call for process: server.exe modified
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            3.125.188.1680QHSbsQIhu.exeGet hashmaliciousRedLineBrowse
            • 7.tcp.eu.ngrok.io:13707/
            3.124.67.191Invoice_12_2022FGT_UKESTATE.exeGet hashmaliciousRedLineBrowse
            • 7.tcp.eu.ngrok.io:13616/
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            7.tcp.eu.ngrok.io02424A493EDF7B2F67778C64D2EDAB2EDF41A5469A697.exeGet hashmaliciousNjratBrowse
            • 3.126.224.214
            XClient111.exeGet hashmaliciousXWormBrowse
            • 3.124.67.191
            hp5NcrrHi1.exeGet hashmaliciousNjratBrowse
            • 3.126.224.214
            host.exeGet hashmaliciousNjratBrowse
            • 3.68.56.232
            yUyZOMK3zf.exeGet hashmaliciousNjratBrowse
            • 3.125.188.168
            929EWOgWCn.exeGet hashmaliciousNjratBrowse
            • 3.126.224.214
            3mkd92Kq1A.exeGet hashmaliciousNjratBrowse
            • 3.68.56.232
            ne8hteT3EN.exeGet hashmaliciousNjratBrowse
            • 3.124.67.191
            Haerm.exeGet hashmaliciousNjratBrowse
            • 3.126.224.214
            sWvS33vecn.exeGet hashmaliciousNjratBrowse
            • 3.126.224.214
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            AMAZON-02USRDFchOT4i0.exeGet hashmaliciousUnknownBrowse
            • 13.59.156.167
            DnauGgOFTX.elfGet hashmaliciousMoobot, OkiruBrowse
            • 34.254.182.186
            https://www.steampowered.solutions/Get hashmaliciousUnknownBrowse
            • 54.76.79.16
            https://verfolgung-lieferung.net/Get hashmaliciousUnknownBrowse
            • 13.225.214.56
            https://wall.page/jcw7sZGet hashmaliciousUnknownBrowse
            • 35.179.36.99
            PsoriasisGet hashmaliciousUnknownBrowse
            • 54.70.175.13
            4NnBaAMXoc.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
            • 35.152.84.43
            sQSqM58mvl.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
            • 34.247.74.11
            https://palmettoanimalclinic.aweb.page/p/0ac693e3-6f85-4fd6-86d7-f770e6e73d32Get hashmaliciousUnknownBrowse
            • 52.217.194.240
            https://rise.articulate.com/share/zO8B8EFq4bxdit8kVRcUzBOZMbkl1WSz#/lessons/2GyyR-D75sLlZcXDanN5dOaLxSSkgNvoGet hashmaliciousHTMLPhisherBrowse
            • 108.156.83.19
            AMAZON-02USRDFchOT4i0.exeGet hashmaliciousUnknownBrowse
            • 13.59.156.167
            DnauGgOFTX.elfGet hashmaliciousMoobot, OkiruBrowse
            • 34.254.182.186
            https://www.steampowered.solutions/Get hashmaliciousUnknownBrowse
            • 54.76.79.16
            https://verfolgung-lieferung.net/Get hashmaliciousUnknownBrowse
            • 13.225.214.56
            https://wall.page/jcw7sZGet hashmaliciousUnknownBrowse
            • 35.179.36.99
            PsoriasisGet hashmaliciousUnknownBrowse
            • 54.70.175.13
            4NnBaAMXoc.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
            • 35.152.84.43
            sQSqM58mvl.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
            • 34.247.74.11
            https://palmettoanimalclinic.aweb.page/p/0ac693e3-6f85-4fd6-86d7-f770e6e73d32Get hashmaliciousUnknownBrowse
            • 52.217.194.240
            https://rise.articulate.com/share/zO8B8EFq4bxdit8kVRcUzBOZMbkl1WSz#/lessons/2GyyR-D75sLlZcXDanN5dOaLxSSkgNvoGet hashmaliciousHTMLPhisherBrowse
            • 108.156.83.19
            No context
            No context
            Process:C:\Users\user\AppData\Local\Temp\server.exe
            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
            Category:dropped
            Size (bytes):95232
            Entropy (8bit):5.5653601314847645
            Encrypted:false
            SSDEEP:768:8Y3Jwmm6h1ychQVHwUM7k+rhHX9/NhUQBi0yXxrjEtCdnl2pi1Rz4Rk39sGdpTgM:Nw76rCHwB4+r9ptcjEwzGi1dDtDTgS
            MD5:59BC430C7E94EDA88BA59FC1FA3D2C0C
            SHA1:7AF6F4BD5D7C38AD87432785344F3016E873B151
            SHA-256:3477C51B4DB8004874EEB950FCED5E89D636B4AD123595CA403F8FCA5C430498
            SHA-512:578F3B0C79A83BF85ED945DD6FF8E3F6469CE40BFBF7058849F6901A64E12719C73A98FEDB3D877AC9B8E7A4FB1AA72186431F7AD933C1E705D6298D33FF2B07
            Malicious:true
            Yara Hits:
            • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Umbrella.flv.exe, Author: Joe Security
            • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\Umbrella.flv.exe, Author: unknown
            • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: C:\Umbrella.flv.exe, Author: Florian Roth
            • Rule: Njrat, Description: detect njRAT in memory, Source: C:\Umbrella.flv.exe, Author: JPCERT/CC Incident Response Group
            • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Umbrella.flv.exe, Author: ditekSHen
            Antivirus:
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            • Antivirus: ReversingLabs, Detection: 84%
            • Antivirus: Virustotal, Detection: 71%, Browse
            Reputation:low
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L... ..e.................p.............. ........@.. ....................................@.................................t...W.................................................................................... ............... ..H............text....n... ...p.................. ..`.reloc...............r..............@..B................................................................H...........\...........................................................&.(......**..(......*.s.........s ........s!........s".........*.0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
            Process:C:\Users\user\Desktop\JawnEmT6S2.exe
            File Type:ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):525
            Entropy (8bit):5.259753436570609
            Encrypted:false
            SSDEEP:12:Q3LaJU2C9XAn10Ug+9pfu9t0U29xtUz1B0U2uk71K6xhk7v:MLF2CpI3zffup29Iz52Ve
            MD5:260E01CC001F9C4643CA7A62F395D747
            SHA1:492AD0ACE3A9C8736909866EEA168962D418BE5A
            SHA-256:4BC52CCF866F489772A6919A0CC2C55B1432729D6BDF29E17E5853ABDFAB6030
            SHA-512:01AF7D75257E3DBD460E328F5C057D0367B83D3D9397E89CA3AE54AB9B2842D62352D8CCB4BE98ACE0C5667846759D32C199DE39ECCD0CF9CD6A83267D27E7C4
            Malicious:false
            Reputation:moderate, very likely benign file
            Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\bec14584c93014efbc76285c35d1e891\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\7d443c6c007fe8696f9aa6ff1da53ef7\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\2cdaeaf53e3d49038cf7cb0ce9d805d3\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\d0e5535854cce87ea7f2d69d0594b7a8\System.Windows.Forms.ni.dll",0..
            Process:C:\Users\user\Desktop\JawnEmT6S2.exe
            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
            Category:dropped
            Size (bytes):95232
            Entropy (8bit):5.5653601314847645
            Encrypted:false
            SSDEEP:768:8Y3Jwmm6h1ychQVHwUM7k+rhHX9/NhUQBi0yXxrjEtCdnl2pi1Rz4Rk39sGdpTgM:Nw76rCHwB4+r9ptcjEwzGi1dDtDTgS
            MD5:59BC430C7E94EDA88BA59FC1FA3D2C0C
            SHA1:7AF6F4BD5D7C38AD87432785344F3016E873B151
            SHA-256:3477C51B4DB8004874EEB950FCED5E89D636B4AD123595CA403F8FCA5C430498
            SHA-512:578F3B0C79A83BF85ED945DD6FF8E3F6469CE40BFBF7058849F6901A64E12719C73A98FEDB3D877AC9B8E7A4FB1AA72186431F7AD933C1E705D6298D33FF2B07
            Malicious:true
            Yara Hits:
            • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Users\user\AppData\Local\Temp\server.exe, Author: Joe Security
            • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\Users\user\AppData\Local\Temp\server.exe, Author: unknown
            • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: C:\Users\user\AppData\Local\Temp\server.exe, Author: Florian Roth
            • Rule: Njrat, Description: detect njRAT in memory, Source: C:\Users\user\AppData\Local\Temp\server.exe, Author: JPCERT/CC Incident Response Group
            • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Local\Temp\server.exe, Author: ditekSHen
            Antivirus:
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            • Antivirus: ReversingLabs, Detection: 84%
            • Antivirus: Virustotal, Detection: 71%, Browse
            Reputation:low
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L... ..e.................p.............. ........@.. ....................................@.................................t...W.................................................................................... ............... ..H............text....n... ...p.................. ..`.reloc...............r..............@..B................................................................H...........\...........................................................&.(......**..(......*.s.........s ........s!........s".........*.0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
            Process:C:\Users\user\AppData\Local\Temp\server.exe
            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
            Category:dropped
            Size (bytes):95232
            Entropy (8bit):5.5653601314847645
            Encrypted:false
            SSDEEP:768:8Y3Jwmm6h1ychQVHwUM7k+rhHX9/NhUQBi0yXxrjEtCdnl2pi1Rz4Rk39sGdpTgM:Nw76rCHwB4+r9ptcjEwzGi1dDtDTgS
            MD5:59BC430C7E94EDA88BA59FC1FA3D2C0C
            SHA1:7AF6F4BD5D7C38AD87432785344F3016E873B151
            SHA-256:3477C51B4DB8004874EEB950FCED5E89D636B4AD123595CA403F8FCA5C430498
            SHA-512:578F3B0C79A83BF85ED945DD6FF8E3F6469CE40BFBF7058849F6901A64E12719C73A98FEDB3D877AC9B8E7A4FB1AA72186431F7AD933C1E705D6298D33FF2B07
            Malicious:true
            Yara Hits:
            • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Epic Games.exe, Author: Joe Security
            • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Epic Games.exe, Author: unknown
            • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Epic Games.exe, Author: Florian Roth
            • Rule: Njrat, Description: detect njRAT in memory, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Epic Games.exe, Author: JPCERT/CC Incident Response Group
            • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Epic Games.exe, Author: ditekSHen
            Antivirus:
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            • Antivirus: ReversingLabs, Detection: 84%
            • Antivirus: Virustotal, Detection: 71%, Browse
            Reputation:low
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L... ..e.................p.............. ........@.. ....................................@.................................t...W.................................................................................... ............... ..H............text....n... ...p.................. ..`.reloc...............r..............@..B................................................................H...........\...........................................................&.(......**..(......*.s.........s ........s!........s".........*.0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
            Process:C:\Users\user\AppData\Local\Temp\server.exe
            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
            Category:dropped
            Size (bytes):95232
            Entropy (8bit):5.5653601314847645
            Encrypted:false
            SSDEEP:768:8Y3Jwmm6h1ychQVHwUM7k+rhHX9/NhUQBi0yXxrjEtCdnl2pi1Rz4Rk39sGdpTgM:Nw76rCHwB4+r9ptcjEwzGi1dDtDTgS
            MD5:59BC430C7E94EDA88BA59FC1FA3D2C0C
            SHA1:7AF6F4BD5D7C38AD87432785344F3016E873B151
            SHA-256:3477C51B4DB8004874EEB950FCED5E89D636B4AD123595CA403F8FCA5C430498
            SHA-512:578F3B0C79A83BF85ED945DD6FF8E3F6469CE40BFBF7058849F6901A64E12719C73A98FEDB3D877AC9B8E7A4FB1AA72186431F7AD933C1E705D6298D33FF2B07
            Malicious:true
            Yara Hits:
            • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bd45e682ad8a06dcb9168f1be41d3129Epic Games.exe, Author: Joe Security
            • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bd45e682ad8a06dcb9168f1be41d3129Epic Games.exe, Author: unknown
            • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bd45e682ad8a06dcb9168f1be41d3129Epic Games.exe, Author: Florian Roth
            • Rule: Njrat, Description: detect njRAT in memory, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bd45e682ad8a06dcb9168f1be41d3129Epic Games.exe, Author: JPCERT/CC Incident Response Group
            • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bd45e682ad8a06dcb9168f1be41d3129Epic Games.exe, Author: ditekSHen
            Antivirus:
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            • Antivirus: ReversingLabs, Detection: 84%
            • Antivirus: Virustotal, Detection: 71%, Browse
            Reputation:low
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L... ..e.................p.............. ........@.. ....................................@.................................t...W.................................................................................... ............... ..H............text....n... ...p.................. ..`.reloc...............r..............@..B................................................................H...........\...........................................................&.(......**..(......*.s.........s ........s!........s".........*.0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
            Process:C:\Users\user\Desktop\JawnEmT6S2.exe
            File Type:Unicode text, UTF-8 (with BOM) text, with no line terminators
            Category:dropped
            Size (bytes):5
            Entropy (8bit):2.321928094887362
            Encrypted:false
            SSDEEP:3:h:h
            MD5:C60FEEBD511C87B86DEA130692995A0F
            SHA1:D64447A8B3D8949CAB5A1F8D168F7C6FEE6B6A0A
            SHA-256:632994320C04707E7EF564B3E983A694170561659552A24DFE14A922DCF0F511
            SHA-512:BF03FBF3329C6F7A21ECD620319EF1A6F676B22A27AFD24AAB546483C3FE5F6EEE7BBCFDC14C5F6626957F2B96519BDD21AAEA45D74A80253FA4220C8C12DF7C
            Malicious:false
            Reputation:low
            Preview:.27
            Process:C:\Users\user\AppData\Local\Temp\server.exe
            File Type:Microsoft Windows Autorun file
            Category:dropped
            Size (bytes):55
            Entropy (8bit):4.474554204780528
            Encrypted:false
            SSDEEP:3:It1KV2PHQCyK0x:e1KAwCyD
            MD5:40B1630BE21F39CB17BD1963CAE5A207
            SHA1:63C14BD151D42820DD45C033363FA5B9E1D34124
            SHA-256:F87E55F1A423B65FD639146F71F6027DBD4D6E69B65D9A17F1744774AA6589E1
            SHA-512:833112ED4A9A3C621D2FFFC78F83502B2937B82A2CF9BC692D75D907CE2AA46C2D97CFE23C402DB3292B2DD2655FF8692C3CD00D5BA4D792C3D8AF24958E1926
            Malicious:true
            Reputation:moderate, very likely benign file
            Preview:[autorun]..open=C:\Umbrella.flv.exe..shellexecute=C:\..
            Process:C:\Windows\SysWOW64\netsh.exe
            File Type:ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):313
            Entropy (8bit):4.971939296804078
            Encrypted:false
            SSDEEP:6:/ojfKsUTGN8Ypox42k9L+DbGMKeQE+vigqAZs2E+AYeDPO+Yswyha:wjPIGNrkHk9iaeIM6ADDPOHyha
            MD5:689E2126A85BF55121488295EE068FA1
            SHA1:09BAAA253A49D80C18326DFBCA106551EBF22DD6
            SHA-256:D968A966EF474068E41256321F77807A042F1965744633D37A203A705662EC25
            SHA-512:C3736A8FC7E6573FA1B26FE6A901C05EE85C55A4A276F8F569D9EADC9A58BEC507D1BB90DBF9EA62AE79A6783178C69304187D6B90441D82E46F5F56172B5C5C
            Malicious:false
            Preview:..IMPORTANT: Command executed successfully...However, "netsh firewall" is deprecated;..use "netsh advfirewall firewall" instead...For more information on using "netsh advfirewall firewall" commands..instead of "netsh firewall", see KB article 947709..at https://go.microsoft.com/fwlink/?linkid=121488 .....Ok.....
            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
            Entropy (8bit):5.5653601314847645
            TrID:
            • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
            • Win32 Executable (generic) a (10002005/4) 49.75%
            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
            • Windows Screen Saver (13104/52) 0.07%
            • Generic Win/DOS Executable (2004/3) 0.01%
            File name:JawnEmT6S2.exe
            File size:95'232 bytes
            MD5:59bc430c7e94eda88ba59fc1fa3d2c0c
            SHA1:7af6f4bd5d7c38ad87432785344f3016e873b151
            SHA256:3477c51b4db8004874eeb950fced5e89d636b4ad123595ca403f8fca5c430498
            SHA512:578f3b0c79a83bf85ed945dd6ff8e3f6469ce40bfbf7058849f6901a64e12719c73a98fedb3d877ac9b8e7a4fb1aa72186431f7ad933c1e705d6298d33ff2b07
            SSDEEP:768:8Y3Jwmm6h1ychQVHwUM7k+rhHX9/NhUQBi0yXxrjEtCdnl2pi1Rz4Rk39sGdpTgM:Nw76rCHwB4+r9ptcjEwzGi1dDtDTgS
            TLSH:B893C84977E52564E0BF56F79871F2004F38B4871602E79E48F219AA1A33AC44F85FEB
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L... ..e.................p............... ........@.. ....................................@................................
            Icon Hash:90cececece8e8eb0
            Entrypoint:0x418ece
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x400000
            Subsystem:windows gui
            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Time Stamp:0x65D7FA20 [Fri Feb 23 01:51:28 2024 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:4
            OS Version Minor:0
            File Version Major:4
            File Version Minor:0
            Subsystem Version Major:4
            Subsystem Version Minor:0
            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
            Instruction
            jmp dword ptr [00402000h]
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0x18e740x57.text
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x1a0000xc.reloc
            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x20000x16ed40x170002ef6a2c0830dbb3c1e27b1df5c408a00False0.368110988451087data5.597045294786274IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            .reloc0x1a0000xc0x200e522aa3f02fe9db9653a57047c62df03False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            DLLImport
            mscoree.dll_CorExeMain
            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
            04/27/24-04:38:38.307737TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4973810250192.168.2.43.124.67.191
            04/27/24-04:40:41.338997TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4973910250192.168.2.43.124.67.191
            04/27/24-04:40:41.169696TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4973910250192.168.2.43.124.67.191
            04/27/24-04:37:16.009989TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4973010250192.168.2.43.125.188.168
            04/27/24-04:37:16.009989TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4973010250192.168.2.43.125.188.168
            04/27/24-04:40:47.691759TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4973910250192.168.2.43.124.67.191
            04/27/24-04:38:38.479153TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4973810250192.168.2.43.124.67.191
            04/27/24-04:40:47.691759TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4973910250192.168.2.43.124.67.191
            04/27/24-04:37:07.124534TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4973010250192.168.2.43.125.188.168
            04/27/24-04:37:06.953679TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4973010250192.168.2.43.125.188.168
            TimestampSource PortDest PortSource IPDest IP
            Apr 27, 2024 04:37:06.300153971 CEST4973010250192.168.2.43.125.188.168
            Apr 27, 2024 04:37:06.470803976 CEST10250497303.125.188.168192.168.2.4
            Apr 27, 2024 04:37:06.470911980 CEST4973010250192.168.2.43.125.188.168
            Apr 27, 2024 04:37:06.953679085 CEST4973010250192.168.2.43.125.188.168
            Apr 27, 2024 04:37:07.124347925 CEST10250497303.125.188.168192.168.2.4
            Apr 27, 2024 04:37:07.124533892 CEST4973010250192.168.2.43.125.188.168
            Apr 27, 2024 04:37:07.295502901 CEST10250497303.125.188.168192.168.2.4
            Apr 27, 2024 04:37:16.009989023 CEST4973010250192.168.2.43.125.188.168
            Apr 27, 2024 04:37:16.182766914 CEST10250497303.125.188.168192.168.2.4
            Apr 27, 2024 04:37:31.234436989 CEST10250497303.125.188.168192.168.2.4
            Apr 27, 2024 04:37:31.234580040 CEST4973010250192.168.2.43.125.188.168
            Apr 27, 2024 04:37:46.406369925 CEST10250497303.125.188.168192.168.2.4
            Apr 27, 2024 04:37:46.406466961 CEST4973010250192.168.2.43.125.188.168
            Apr 27, 2024 04:38:01.582392931 CEST10250497303.125.188.168192.168.2.4
            Apr 27, 2024 04:38:01.582519054 CEST4973010250192.168.2.43.125.188.168
            Apr 27, 2024 04:38:16.806535959 CEST10250497303.125.188.168192.168.2.4
            Apr 27, 2024 04:38:16.806606054 CEST4973010250192.168.2.43.125.188.168
            Apr 27, 2024 04:38:31.983467102 CEST10250497303.125.188.168192.168.2.4
            Apr 27, 2024 04:38:31.983550072 CEST4973010250192.168.2.43.125.188.168
            Apr 27, 2024 04:38:36.001344919 CEST10250497303.125.188.168192.168.2.4
            Apr 27, 2024 04:38:36.001435995 CEST4973010250192.168.2.43.125.188.168
            Apr 27, 2024 04:38:38.008074045 CEST4973010250192.168.2.43.125.188.168
            Apr 27, 2024 04:38:38.128222942 CEST4973810250192.168.2.43.124.67.191
            Apr 27, 2024 04:38:38.178622007 CEST10250497303.125.188.168192.168.2.4
            Apr 27, 2024 04:38:38.301223993 CEST10250497383.124.67.191192.168.2.4
            Apr 27, 2024 04:38:38.301302910 CEST4973810250192.168.2.43.124.67.191
            Apr 27, 2024 04:38:38.307737112 CEST4973810250192.168.2.43.124.67.191
            Apr 27, 2024 04:38:38.479065895 CEST10250497383.124.67.191192.168.2.4
            Apr 27, 2024 04:38:38.479152918 CEST4973810250192.168.2.43.124.67.191
            Apr 27, 2024 04:38:38.649776936 CEST10250497383.124.67.191192.168.2.4
            Apr 27, 2024 04:38:53.650569916 CEST10250497383.124.67.191192.168.2.4
            Apr 27, 2024 04:38:53.650625944 CEST4973810250192.168.2.43.124.67.191
            Apr 27, 2024 04:39:24.082606077 CEST10250497383.124.67.191192.168.2.4
            Apr 27, 2024 04:39:24.082683086 CEST4973810250192.168.2.43.124.67.191
            Apr 27, 2024 04:39:39.254786968 CEST10250497383.124.67.191192.168.2.4
            Apr 27, 2024 04:39:39.254890919 CEST4973810250192.168.2.43.124.67.191
            Apr 27, 2024 04:39:54.426706076 CEST10250497383.124.67.191192.168.2.4
            Apr 27, 2024 04:39:54.426858902 CEST4973810250192.168.2.43.124.67.191
            Apr 27, 2024 04:40:09.650949955 CEST10250497383.124.67.191192.168.2.4
            Apr 27, 2024 04:40:09.651032925 CEST4973810250192.168.2.43.124.67.191
            Apr 27, 2024 04:40:24.827370882 CEST10250497383.124.67.191192.168.2.4
            Apr 27, 2024 04:40:24.827429056 CEST4973810250192.168.2.43.124.67.191
            Apr 27, 2024 04:40:38.876118898 CEST10250497383.124.67.191192.168.2.4
            Apr 27, 2024 04:40:38.876207113 CEST4973810250192.168.2.43.124.67.191
            Apr 27, 2024 04:40:40.879837990 CEST4973810250192.168.2.43.124.67.191
            Apr 27, 2024 04:40:40.991209030 CEST4973910250192.168.2.43.124.67.191
            Apr 27, 2024 04:40:41.050489902 CEST10250497383.124.67.191192.168.2.4
            Apr 27, 2024 04:40:41.161664009 CEST10250497393.124.67.191192.168.2.4
            Apr 27, 2024 04:40:41.161756039 CEST4973910250192.168.2.43.124.67.191
            Apr 27, 2024 04:40:41.169696093 CEST4973910250192.168.2.43.124.67.191
            Apr 27, 2024 04:40:41.338897943 CEST10250497393.124.67.191192.168.2.4
            Apr 27, 2024 04:40:41.338996887 CEST4973910250192.168.2.43.124.67.191
            Apr 27, 2024 04:40:41.512901068 CEST10250497393.124.67.191192.168.2.4
            Apr 27, 2024 04:40:47.691759109 CEST4973910250192.168.2.43.124.67.191
            Apr 27, 2024 04:40:47.861865997 CEST10250497393.124.67.191192.168.2.4
            Apr 27, 2024 04:41:02.902108908 CEST10250497393.124.67.191192.168.2.4
            Apr 27, 2024 04:41:02.903666973 CEST4973910250192.168.2.43.124.67.191
            TimestampSource PortDest PortSource IPDest IP
            Apr 27, 2024 04:37:06.186434031 CEST5373453192.168.2.41.1.1.1
            Apr 27, 2024 04:37:06.298206091 CEST53537341.1.1.1192.168.2.4
            Apr 27, 2024 04:38:38.009110928 CEST5530453192.168.2.41.1.1.1
            Apr 27, 2024 04:38:38.099939108 CEST53553041.1.1.1192.168.2.4
            Apr 27, 2024 04:40:40.880825996 CEST6278553192.168.2.41.1.1.1
            Apr 27, 2024 04:40:40.990155935 CEST53627851.1.1.1192.168.2.4
            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
            Apr 27, 2024 04:37:06.186434031 CEST192.168.2.41.1.1.10x4b56Standard query (0)7.tcp.eu.ngrok.ioA (IP address)IN (0x0001)false
            Apr 27, 2024 04:38:38.009110928 CEST192.168.2.41.1.1.10xf984Standard query (0)7.tcp.eu.ngrok.ioA (IP address)IN (0x0001)false
            Apr 27, 2024 04:40:40.880825996 CEST192.168.2.41.1.1.10xc44Standard query (0)7.tcp.eu.ngrok.ioA (IP address)IN (0x0001)false
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
            Apr 27, 2024 04:37:06.298206091 CEST1.1.1.1192.168.2.40x4b56No error (0)7.tcp.eu.ngrok.io3.125.188.168A (IP address)IN (0x0001)false
            Apr 27, 2024 04:38:38.099939108 CEST1.1.1.1192.168.2.40xf984No error (0)7.tcp.eu.ngrok.io3.124.67.191A (IP address)IN (0x0001)false
            Apr 27, 2024 04:40:40.990155935 CEST1.1.1.1192.168.2.40xc44No error (0)7.tcp.eu.ngrok.io3.124.67.191A (IP address)IN (0x0001)false

            Click to jump to process

            Click to jump to process

            Click to dive into process behavior distribution

            Click to jump to process

            Target ID:0
            Start time:04:36:52
            Start date:27/04/2024
            Path:C:\Users\user\Desktop\JawnEmT6S2.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\Desktop\JawnEmT6S2.exe"
            Imagebase:0x500000
            File size:95'232 bytes
            MD5 hash:59BC430C7E94EDA88BA59FC1FA3D2C0C
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000000.00000000.1620882363.0000000000502000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: 00000000.00000000.1620882363.0000000000502000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
            • Rule: Njrat, Description: detect njRAT in memory, Source: 00000000.00000000.1620882363.0000000000502000.00000002.00000001.01000000.00000003.sdmp, Author: JPCERT/CC Incident Response Group
            • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000000.00000002.1663600842.0000000003AC8000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: 00000000.00000002.1663600842.0000000003AC8000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
            • Rule: Njrat, Description: detect njRAT in memory, Source: 00000000.00000002.1663600842.0000000003AC8000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
            Reputation:low
            Has exited:true

            Target ID:1
            Start time:04:36:56
            Start date:27/04/2024
            Path:C:\Users\user\AppData\Local\Temp\server.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\AppData\Local\Temp\server.exe"
            Imagebase:0x10000
            File size:95'232 bytes
            MD5 hash:59BC430C7E94EDA88BA59FC1FA3D2C0C
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000001.00000002.4103059609.00000000026F1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Users\user\AppData\Local\Temp\server.exe, Author: Joe Security
            • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\Users\user\AppData\Local\Temp\server.exe, Author: unknown
            • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: C:\Users\user\AppData\Local\Temp\server.exe, Author: Florian Roth
            • Rule: Njrat, Description: detect njRAT in memory, Source: C:\Users\user\AppData\Local\Temp\server.exe, Author: JPCERT/CC Incident Response Group
            • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Local\Temp\server.exe, Author: ditekSHen
            Antivirus matches:
            • Detection: 100%, Avira
            • Detection: 100%, Joe Sandbox ML
            • Detection: 84%, ReversingLabs
            • Detection: 71%, Virustotal, Browse
            Reputation:low
            Has exited:false

            Target ID:2
            Start time:04:36:58
            Start date:27/04/2024
            Path:C:\Windows\SysWOW64\netsh.exe
            Wow64 process (32bit):true
            Commandline:netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\server.exe" "server.exe" ENABLE
            Imagebase:0x1560000
            File size:82'432 bytes
            MD5 hash:4E89A1A088BE715D6C946E55AB07C7DF
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:moderate
            Has exited:true

            Target ID:3
            Start time:04:36:58
            Start date:27/04/2024
            Path:C:\Windows\System32\conhost.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Imagebase:0x7ff7699e0000
            File size:862'208 bytes
            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Reset < >

              Execution Graph

              Execution Coverage:2.6%
              Dynamic/Decrypted Code Coverage:100%
              Signature Coverage:0%
              Total number of Nodes:58
              Total number of Limit Nodes:4
              execution_graph 14175 bfa9bf 14176 bfa9c9 SetErrorMode 14175->14176 14178 bfaa53 14176->14178 14136 bfabbe 14137 bfabea FindCloseChangeNotification 14136->14137 14138 bfac29 14136->14138 14139 bfabf8 14137->14139 14138->14137 14140 bfa65e 14141 bfa68a OleInitialize 14140->14141 14142 bfa6c0 14140->14142 14143 bfa698 14141->14143 14142->14141 14195 bfa61e 14196 bfa65e OleInitialize 14195->14196 14198 bfa698 14196->14198 14199 bfab7c 14201 bfabbe FindCloseChangeNotification 14199->14201 14202 bfabf8 14201->14202 14144 bfa59a 14145 bfa5d8 DuplicateHandle 14144->14145 14146 bfa610 14144->14146 14147 bfa5e6 14145->14147 14146->14145 14183 bfac37 14184 bfac6a GetFileType 14183->14184 14186 bfaccc 14184->14186 14203 bfae77 14204 bfaeae WriteFile 14203->14204 14206 bfaf15 14204->14206 14187 bfb036 14189 bfb06a CreateMutexW 14187->14189 14190 bfb0e5 14189->14190 14207 bfaa75 14210 bfaaa6 CreateFileW 14207->14210 14209 bfab2d 14210->14209 14211 bfa573 14212 bfa59a DuplicateHandle 14211->14212 14214 bfa5e6 14212->14214 14148 bfaa12 14149 bfaa3e SetErrorMode 14148->14149 14150 bfaa67 14148->14150 14151 bfaa53 14149->14151 14150->14149 14152 bfaeae 14154 bfaee3 WriteFile 14152->14154 14155 bfaf15 14154->14155 14179 bfa6ce 14180 bfa72e OleGetClipboard 14179->14180 14182 bfa78c 14180->14182 14163 bfb06a 14164 bfb0a2 CreateMutexW 14163->14164 14166 bfb0e5 14164->14166 14167 bfaaa6 14168 bfaade CreateFileW 14167->14168 14170 bfab2d 14168->14170 14171 bfb446 14172 bfb46c ShellExecuteExW 14171->14172 14174 bfb488 14172->14174 14191 bfb424 14192 bfb446 ShellExecuteExW 14191->14192 14194 bfb488 14192->14194

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 16 4cd4298-4cd42c9 18 4cd42cf-4cd4350 16->18 19 4cd4352-4cd435a 16->19 18->19 45 4cd435c 18->45 20 4cd4366-4cd437a 19->20 21 4cd452f-4cd467d 20->21 22 4cd4380-4cd43bc 20->22 59 4cd480d-4cd4821 21->59 60 4cd4683-4cd47d2 21->60 34 4cd43ed-4cd44ea 22->34 35 4cd43be-4cd43e6 22->35 156 4cd44ef 34->156 35->34 45->20 62 4cd496f-4cd4983 59->62 63 4cd4827-4cd4934 59->63 60->59 66 4cd4985-4cd499b call 4cd4210 62->66 67 4cd49d6-4cd49ea 62->67 63->62 66->67 69 4cd49ec-4cd49f7 67->69 70 4cd4a32-4cd4a46 67->70 69->70 72 4cd4a4c-4cd4b59 70->72 73 4cd4b94-4cd4ba8 70->73 72->73 78 4cd4bae-4cd4bc2 73->78 79 4cd4cd4-4cd4ce8 73->79 82 4cd4bc4-4cd4bcb 78->82 83 4cd4bd0-4cd4be4 78->83 87 4cd4cee-4cd4f2d 79->87 88 4cd4f74-4cd4f88 79->88 90 4cd4c48-4cd4c5c 82->90 91 4cd4bef-4cd4c03 83->91 92 4cd4be6-4cd4bed 83->92 87->88 93 4cd4f8a-4cd4f9b 88->93 94 4cd4fe2-4cd4ff6 88->94 97 4cd4c5e-4cd4c74 90->97 98 4cd4c76-4cd4c82 90->98 99 4cd4c0e-4cd4c22 91->99 100 4cd4c05-4cd4c0c 91->100 92->90 93->94 95 4cd4ff8-4cd4ffe 94->95 96 4cd5045-4cd5059 94->96 95->96 106 4cd505b 96->106 107 4cd50a2-4cd50b6 96->107 105 4cd4c8d 97->105 98->105 109 4cd4c2d-4cd4c41 99->109 110 4cd4c24-4cd4c2b 99->110 100->90 105->79 106->107 113 4cd512d-4cd5141 107->113 114 4cd50b8-4cd50e1 107->114 109->90 119 4cd4c43-4cd4c45 109->119 110->90 121 4cd53b4-4cd53c8 113->121 122 4cd5147-4cd5363 113->122 114->113 119->90 129 4cd549e-4cd54b2 121->129 130 4cd53ce-4cd5457 121->130 510 4cd5365 122->510 511 4cd5367 122->511 133 4cd566f-4cd5683 129->133 134 4cd54b8-4cd5628 129->134 130->129 140 4cd5689-4cd579f 133->140 141 4cd57e6-4cd57fa 133->141 134->133 140->141 148 4cd595d-4cd5971 141->148 149 4cd5800-4cd5916 141->149 152 4cd5ad4-4cd5ae8 148->152 153 4cd5977-4cd5a8d 148->153 149->148 158 4cd5aee-4cd5c04 152->158 159 4cd5c4b-4cd5c5f 152->159 153->152 156->21 158->159 166 4cd5c65-4cd5d7b 159->166 167 4cd5dc2-4cd5dd6 159->167 166->167 173 4cd5ddc-4cd5ef2 167->173 174 4cd5f39-4cd5f4d 167->174 173->174 186 4cd60b0-4cd60c4 174->186 187 4cd5f53-4cd6069 174->187 195 4cd60ca-4cd61e0 186->195 196 4cd6227-4cd623b 186->196 187->186 195->196 204 4cd639e-4cd63b2 196->204 205 4cd6241-4cd6357 196->205 211 4cd63b8-4cd63fd call 4cd4278 204->211 212 4cd6536-4cd654a 204->212 205->204 337 4cd64bd-4cd64df 211->337 218 4cd668d-4cd66a1 212->218 219 4cd6550-4cd656f 212->219 230 4cd67ee-4cd6802 218->230 231 4cd66a7-4cd67a7 218->231 252 4cd6614-4cd6636 219->252 238 4cd694f-4cd6963 230->238 239 4cd6808-4cd6908 230->239 231->230 256 4cd6969-4cd6a69 238->256 257 4cd6ab0-4cd6ada 238->257 239->238 263 4cd663c 252->263 264 4cd6574-4cd6583 252->264 256->257 278 4cd6b9a-4cd6bae 257->278 279 4cd6ae0-4cd6b53 257->279 263->218 273 4cd663e 264->273 274 4cd6589-4cd65bc 264->274 305 4cd6643-4cd668b 273->305 364 4cd65be-4cd65f8 274->364 365 4cd6603-4cd660c 274->365 293 4cd6c8b-4cd6c9f 278->293 294 4cd6bb4-4cd6c44 278->294 279->278 299 4cd6de5-4cd6df9 293->299 300 4cd6ca5-4cd6d9e 293->300 294->293 313 4cd705c-4cd7070 299->313 314 4cd6dff-4cd6e4f 299->314 300->299 305->218 321 4cd7158-4cd715f 313->321 322 4cd7076-4cd7111 call 4cd4278 * 2 313->322 427 4cd6ebd-4cd6ee8 314->427 428 4cd6e51-4cd6e77 314->428 322->321 349 4cd64e5 337->349 350 4cd6402-4cd6411 337->350 349->212 362 4cd64e7 350->362 363 4cd6417-4cd64b5 350->363 392 4cd64ec-4cd6534 362->392 363->392 507 4cd64b7 363->507 364->365 365->305 386 4cd660e 365->386 386->252 392->212 502 4cd6eee-4cd6fc1 427->502 503 4cd6fc6-4cd7057 427->503 504 4cd6e79-4cd6e99 428->504 505 4cd6eb8 428->505 502->313 503->313 504->505 505->313 507->337 512 4cd536d 510->512 511->512 512->121
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1663816528.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_4cd0000_JawnEmT6S2.jbxd
              Similarity
              • API ID:
              • String ID: @$|t
              • API String ID: 0-3910548985
              • Opcode ID: 3b2530a3456081c5386525fb71ae5be2d148f69b038e06fe3ee22c77e2d0aec2
              • Instruction ID: 319bb7c2395617a51f2294c024bab676f81987624f7130ba9205d430ae85c9e4
              • Opcode Fuzzy Hash: 3b2530a3456081c5386525fb71ae5be2d148f69b038e06fe3ee22c77e2d0aec2
              • Instruction Fuzzy Hash: 11234A74A01228CFDB25EF35D964BA9B7B2FB48304F1041EAD90967395DB399E81CF90
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 571 4cd428f-4cd42c9 574 4cd42cf-4cd4350 571->574 575 4cd4352-4cd435a 571->575 574->575 601 4cd435c 574->601 576 4cd4366-4cd437a 575->576 577 4cd452f-4cd467d 576->577 578 4cd4380-4cd43bc 576->578 615 4cd480d-4cd4821 577->615 616 4cd4683-4cd47d2 577->616 590 4cd43ed-4cd44ea 578->590 591 4cd43be-4cd43e6 578->591 712 4cd44ef 590->712 591->590 601->576 618 4cd496f-4cd4983 615->618 619 4cd4827-4cd4934 615->619 616->615 622 4cd4985-4cd499b call 4cd4210 618->622 623 4cd49d6-4cd49ea 618->623 619->618 622->623 625 4cd49ec-4cd49f7 623->625 626 4cd4a32-4cd4a46 623->626 625->626 628 4cd4a4c-4cd4b59 626->628 629 4cd4b94-4cd4ba8 626->629 628->629 634 4cd4bae-4cd4bc2 629->634 635 4cd4cd4-4cd4ce8 629->635 638 4cd4bc4-4cd4bcb 634->638 639 4cd4bd0-4cd4be4 634->639 643 4cd4cee-4cd4f2d 635->643 644 4cd4f74-4cd4f88 635->644 646 4cd4c48-4cd4c5c 638->646 647 4cd4bef-4cd4c03 639->647 648 4cd4be6-4cd4bed 639->648 643->644 649 4cd4f8a-4cd4f9b 644->649 650 4cd4fe2-4cd4ff6 644->650 653 4cd4c5e-4cd4c74 646->653 654 4cd4c76-4cd4c82 646->654 655 4cd4c0e-4cd4c22 647->655 656 4cd4c05-4cd4c0c 647->656 648->646 649->650 651 4cd4ff8-4cd4ffe 650->651 652 4cd5045-4cd5059 650->652 651->652 662 4cd505b 652->662 663 4cd50a2-4cd50b6 652->663 661 4cd4c8d 653->661 654->661 665 4cd4c2d-4cd4c41 655->665 666 4cd4c24-4cd4c2b 655->666 656->646 661->635 662->663 669 4cd512d-4cd5141 663->669 670 4cd50b8-4cd50e1 663->670 665->646 675 4cd4c43-4cd4c45 665->675 666->646 677 4cd53b4-4cd53c8 669->677 678 4cd5147-4cd5363 669->678 670->669 675->646 685 4cd549e-4cd54b2 677->685 686 4cd53ce-4cd5457 677->686 1066 4cd5365 678->1066 1067 4cd5367 678->1067 689 4cd566f-4cd5683 685->689 690 4cd54b8-4cd5628 685->690 686->685 696 4cd5689-4cd579f 689->696 697 4cd57e6-4cd57fa 689->697 690->689 696->697 704 4cd595d-4cd5971 697->704 705 4cd5800-4cd5916 697->705 708 4cd5ad4-4cd5ae8 704->708 709 4cd5977-4cd5a8d 704->709 705->704 714 4cd5aee-4cd5c04 708->714 715 4cd5c4b-4cd5c5f 708->715 709->708 712->577 714->715 722 4cd5c65-4cd5d7b 715->722 723 4cd5dc2-4cd5dd6 715->723 722->723 729 4cd5ddc-4cd5ef2 723->729 730 4cd5f39-4cd5f4d 723->730 729->730 742 4cd60b0-4cd60c4 730->742 743 4cd5f53-4cd6069 730->743 751 4cd60ca-4cd61e0 742->751 752 4cd6227-4cd623b 742->752 743->742 751->752 760 4cd639e-4cd63b2 752->760 761 4cd6241-4cd6357 752->761 767 4cd63b8-4cd63fd call 4cd4278 760->767 768 4cd6536-4cd654a 760->768 761->760 893 4cd64bd-4cd64df 767->893 774 4cd668d-4cd66a1 768->774 775 4cd6550-4cd656f 768->775 786 4cd67ee-4cd6802 774->786 787 4cd66a7-4cd67a7 774->787 808 4cd6614-4cd6636 775->808 794 4cd694f-4cd6963 786->794 795 4cd6808-4cd6908 786->795 787->786 812 4cd6969-4cd6a69 794->812 813 4cd6ab0-4cd6ada 794->813 795->794 819 4cd663c 808->819 820 4cd6574-4cd6583 808->820 812->813 834 4cd6b9a-4cd6bae 813->834 835 4cd6ae0-4cd6b53 813->835 819->774 829 4cd663e 820->829 830 4cd6589-4cd65bc 820->830 861 4cd6643-4cd668b 829->861 920 4cd65be-4cd65f8 830->920 921 4cd6603-4cd660c 830->921 849 4cd6c8b-4cd6c9f 834->849 850 4cd6bb4-4cd6c44 834->850 835->834 855 4cd6de5-4cd6df9 849->855 856 4cd6ca5-4cd6d9e 849->856 850->849 869 4cd705c-4cd7070 855->869 870 4cd6dff-4cd6e4f 855->870 856->855 861->774 877 4cd7158-4cd715f 869->877 878 4cd7076-4cd7111 call 4cd4278 * 2 869->878 983 4cd6ebd-4cd6ee8 870->983 984 4cd6e51-4cd6e77 870->984 878->877 905 4cd64e5 893->905 906 4cd6402-4cd6411 893->906 905->768 918 4cd64e7 906->918 919 4cd6417-4cd64b5 906->919 948 4cd64ec-4cd6534 918->948 919->948 1063 4cd64b7 919->1063 920->921 921->861 942 4cd660e 921->942 942->808 948->768 1058 4cd6eee-4cd6fc1 983->1058 1059 4cd6fc6-4cd7057 983->1059 1060 4cd6e79-4cd6e99 984->1060 1061 4cd6eb8 984->1061 1058->869 1059->869 1060->1061 1061->869 1063->893 1068 4cd536d 1066->1068 1067->1068 1068->677
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1663816528.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_4cd0000_JawnEmT6S2.jbxd
              Similarity
              • API ID:
              • String ID: $|t
              • API String ID: 0-1654681884
              • Opcode ID: 43a076d8281687248b8b9479fcc30f449ec20ca7a3ee085e21391a626fa18cc6
              • Instruction ID: dd28e8ff076f00437703d10ebbfabb299945dd3b22708d3a62e878cd3e3dc47c
              • Opcode Fuzzy Hash: 43a076d8281687248b8b9479fcc30f449ec20ca7a3ee085e21391a626fa18cc6
              • Instruction Fuzzy Hash: A0136D74A11228CFDB25EF35D864BA9B7B2FB48304F1041EAD90967395DB399E81CF90
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 0 4cd3449-4cd3460 14 4cd3462 call e005e0 0->14 15 4cd3462 call e00606 0->15 3 4cd3468-4cd34e8 14->3 15->3
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1663816528.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_4cd0000_JawnEmT6S2.jbxd
              Similarity
              • API ID:
              • String ID: HQ$XR$`O$P
              • API String ID: 0-917331388
              • Opcode ID: ef361150a23e482fc21f178fb7820ebb781d1caaccbc04cce7a1d7e14fcac8b9
              • Instruction ID: d6fad6d075a467b01815bfaa955f8b0421e23eff31d1b93ccd5dde7cf8bc4883
              • Opcode Fuzzy Hash: ef361150a23e482fc21f178fb7820ebb781d1caaccbc04cce7a1d7e14fcac8b9
              • Instruction Fuzzy Hash: 29019AB5712206DFC700FB78D1498AC77E1EBC8308B10987CE6458B759EF78880ACB82
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1127 bfaa75-bfaafe 1131 bfab03-bfab0f 1127->1131 1132 bfab00 1127->1132 1133 bfab14-bfab1d 1131->1133 1134 bfab11 1131->1134 1132->1131 1135 bfab1f-bfab43 CreateFileW 1133->1135 1136 bfab6e-bfab73 1133->1136 1134->1133 1139 bfab75-bfab7a 1135->1139 1140 bfab45-bfab6b 1135->1140 1136->1135 1139->1140
              APIs
              • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 00BFAB25
              Memory Dump Source
              • Source File: 00000000.00000002.1662736654.0000000000BFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BFA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_bfa000_JawnEmT6S2.jbxd
              Similarity
              • API ID: CreateFile
              • String ID:
              • API String ID: 823142352-0
              • Opcode ID: 5c1fce5ee307ce865985e775182318dd6b6ce131b3f95462a5fb5de062db406a
              • Instruction ID: 1034472a6b32c8cbcdcc94f7931cdb3e9a261c15cdda4de37436320e94b318f9
              • Opcode Fuzzy Hash: 5c1fce5ee307ce865985e775182318dd6b6ce131b3f95462a5fb5de062db406a
              • Instruction Fuzzy Hash: 453182B1504344AFE721CF25DC85F56BBF8EF05310F08889AE9498B652D375E908CB71
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1143 bfb036-bfb0b9 1147 bfb0be-bfb0c7 1143->1147 1148 bfb0bb 1143->1148 1149 bfb0cc-bfb0d5 1147->1149 1150 bfb0c9 1147->1150 1148->1147 1151 bfb0d7-bfb0fb CreateMutexW 1149->1151 1152 bfb126-bfb12b 1149->1152 1150->1149 1155 bfb12d-bfb132 1151->1155 1156 bfb0fd-bfb123 1151->1156 1152->1151 1155->1156
              APIs
              • CreateMutexW.KERNELBASE(?,?), ref: 00BFB0DD
              Memory Dump Source
              • Source File: 00000000.00000002.1662736654.0000000000BFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BFA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_bfa000_JawnEmT6S2.jbxd
              Similarity
              • API ID: CreateMutex
              • String ID:
              • API String ID: 1964310414-0
              • Opcode ID: d69d3328607df8dedae27e885b3dfc1044cc65681a10b366152c2dad3aa296cb
              • Instruction ID: 010acc2c6751a7b2282c9293725182038fe384a27fc45a497c0c37a530a7716a
              • Opcode Fuzzy Hash: d69d3328607df8dedae27e885b3dfc1044cc65681a10b366152c2dad3aa296cb
              • Instruction Fuzzy Hash: 9F31B3B15093846FE721CB25DD45FA6BFF8EF06310F08849AE984CB692D375A909C771
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1159 bfa6ce-bfa72b 1160 bfa72e-bfa786 OleGetClipboard 1159->1160 1162 bfa78c-bfa7a2 1160->1162
              APIs
              • OleGetClipboard.OLE32(?,00000E24,?,?), ref: 00BFA77E
              Memory Dump Source
              • Source File: 00000000.00000002.1662736654.0000000000BFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BFA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_bfa000_JawnEmT6S2.jbxd
              Similarity
              • API ID: Clipboard
              • String ID:
              • API String ID: 220874293-0
              • Opcode ID: 46db3aa2fc0d81c7d5995b03c6661c1cbf7ac3e42e3031ac0df289b2c082135f
              • Instruction ID: 614ab2680f21d59f1e86cd1e667c092c793f1b42edc6749a5509214687aa48de
              • Opcode Fuzzy Hash: 46db3aa2fc0d81c7d5995b03c6661c1cbf7ac3e42e3031ac0df289b2c082135f
              • Instruction Fuzzy Hash: 4B31807104D3C06FD3138B259C61B62BFB4EF47614F0A44DBE884CB6A3D2296919D772
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1163 bfae77-bfaf05 1167 bfaf49-bfaf4e 1163->1167 1168 bfaf07-bfaf27 WriteFile 1163->1168 1167->1168 1171 bfaf29-bfaf46 1168->1171 1172 bfaf50-bfaf55 1168->1172 1172->1171
              APIs
              • WriteFile.KERNELBASE(?,00000E24,D83BCAC2,00000000,00000000,00000000,00000000), ref: 00BFAF0D
              Memory Dump Source
              • Source File: 00000000.00000002.1662736654.0000000000BFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BFA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_bfa000_JawnEmT6S2.jbxd
              Similarity
              • API ID: FileWrite
              • String ID:
              • API String ID: 3934441357-0
              • Opcode ID: 3ba8bd99f3194de0ee0c3bb00bd42647f6685816cd59022fbc3067c35734162a
              • Instruction ID: 5b8827fc6c2ec490b7a9fb5ae5c75e12ef6fa3109ea97fb451e389393d2b4f8b
              • Opcode Fuzzy Hash: 3ba8bd99f3194de0ee0c3bb00bd42647f6685816cd59022fbc3067c35734162a
              • Instruction Fuzzy Hash: 3F21B1B2408380AFD722CB55DD44F96BFB8EF06314F09849BE9849F552D234A909CB61
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1175 bfaaa6-bfaafe 1178 bfab03-bfab0f 1175->1178 1179 bfab00 1175->1179 1180 bfab14-bfab1d 1178->1180 1181 bfab11 1178->1181 1179->1178 1182 bfab1f-bfab27 CreateFileW 1180->1182 1183 bfab6e-bfab73 1180->1183 1181->1180 1184 bfab2d-bfab43 1182->1184 1183->1182 1186 bfab75-bfab7a 1184->1186 1187 bfab45-bfab6b 1184->1187 1186->1187
              APIs
              • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 00BFAB25
              Memory Dump Source
              • Source File: 00000000.00000002.1662736654.0000000000BFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BFA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_bfa000_JawnEmT6S2.jbxd
              Similarity
              • API ID: CreateFile
              • String ID:
              • API String ID: 823142352-0
              • Opcode ID: ed949d76a438a5df97bfc03a56200b07315d3b3a64c5d5875acff6b5da9fe733
              • Instruction ID: 5e8c3efe14c2e2911eab54ff6b4f32ca03f99bfca381725494bedc7dfe25aaf9
              • Opcode Fuzzy Hash: ed949d76a438a5df97bfc03a56200b07315d3b3a64c5d5875acff6b5da9fe733
              • Instruction Fuzzy Hash: 142186B1500204AFE721CF69DD45F66FBE8EF04710F0488AAEA498B652D375F908CB71
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1190 bfa9bf-bfaa3c 1195 bfaa3e-bfaa51 SetErrorMode 1190->1195 1196 bfaa67-bfaa6c 1190->1196 1197 bfaa6e-bfaa73 1195->1197 1198 bfaa53-bfaa66 1195->1198 1196->1195 1197->1198
              APIs
              • SetErrorMode.KERNELBASE(?), ref: 00BFAA44
              Memory Dump Source
              • Source File: 00000000.00000002.1662736654.0000000000BFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BFA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_bfa000_JawnEmT6S2.jbxd
              Similarity
              • API ID: ErrorMode
              • String ID:
              • API String ID: 2340568224-0
              • Opcode ID: d7abbc04e0d49842d1fc297a78accc515bb394aa910b2c36edf4fd478fe7245d
              • Instruction ID: f0b8ac0633a745a7ba6b084c02408ad7373b850bae61c6464eb788ed57b5ea01
              • Opcode Fuzzy Hash: d7abbc04e0d49842d1fc297a78accc515bb394aa910b2c36edf4fd478fe7245d
              • Instruction Fuzzy Hash: 142139A540E3C4AFD7138B258C64A51BFB4EF53624B0E80DBD9848F6A3D1685C0DC772
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1201 bfac37-bfacb5 1205 bfacea-bfacef 1201->1205 1206 bfacb7-bfacca GetFileType 1201->1206 1205->1206 1207 bfaccc-bface9 1206->1207 1208 bfacf1-bfacf6 1206->1208 1208->1207
              APIs
              • GetFileType.KERNELBASE(?,00000E24,D83BCAC2,00000000,00000000,00000000,00000000), ref: 00BFACBD
              Memory Dump Source
              • Source File: 00000000.00000002.1662736654.0000000000BFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BFA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_bfa000_JawnEmT6S2.jbxd
              Similarity
              • API ID: FileType
              • String ID:
              • API String ID: 3081899298-0
              • Opcode ID: aae8543f74123341a899ff131f738fd429861be8fb4250a1b5ec2a74b6b6f6d0
              • Instruction ID: 8701fa27c93d14a5a18a1cd1abbd4e29c3a6ca5bb535971ce4575aa9b55a0b12
              • Opcode Fuzzy Hash: aae8543f74123341a899ff131f738fd429861be8fb4250a1b5ec2a74b6b6f6d0
              • Instruction Fuzzy Hash: F621D8B54083846FE7228B15DC40BA2BFB8DF47714F0984D7F9848B693D264AD09D771
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1212 bfb06a-bfb0b9 1215 bfb0be-bfb0c7 1212->1215 1216 bfb0bb 1212->1216 1217 bfb0cc-bfb0d5 1215->1217 1218 bfb0c9 1215->1218 1216->1215 1219 bfb0d7-bfb0df CreateMutexW 1217->1219 1220 bfb126-bfb12b 1217->1220 1218->1217 1222 bfb0e5-bfb0fb 1219->1222 1220->1219 1223 bfb12d-bfb132 1222->1223 1224 bfb0fd-bfb123 1222->1224 1223->1224
              APIs
              • CreateMutexW.KERNELBASE(?,?), ref: 00BFB0DD
              Memory Dump Source
              • Source File: 00000000.00000002.1662736654.0000000000BFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BFA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_bfa000_JawnEmT6S2.jbxd
              Similarity
              • API ID: CreateMutex
              • String ID:
              • API String ID: 1964310414-0
              • Opcode ID: bb6cbf9dc3f70fab3383f2c640ec66a4a8b2b6937010aea61bb4b94c84d7f259
              • Instruction ID: c5b5cb272f09621c3b32595c1c28ee3e151e8e7920d1e2c6d3d4f8316ab40a88
              • Opcode Fuzzy Hash: bb6cbf9dc3f70fab3383f2c640ec66a4a8b2b6937010aea61bb4b94c84d7f259
              • Instruction Fuzzy Hash: 612153B1604244AFE720DF29DD85FA6F7E8EF04314F0488AAE945DB641D775E908CB71
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1227 bfab7c-bfabe8 1229 bfabea-bfabf2 FindCloseChangeNotification 1227->1229 1230 bfac29-bfac2e 1227->1230 1232 bfabf8-bfac0a 1229->1232 1230->1229 1233 bfac0c-bfac28 1232->1233 1234 bfac30-bfac35 1232->1234 1234->1233
              APIs
              • FindCloseChangeNotification.KERNELBASE(?), ref: 00BFABF0
              Memory Dump Source
              • Source File: 00000000.00000002.1662736654.0000000000BFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BFA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_bfa000_JawnEmT6S2.jbxd
              Similarity
              • API ID: ChangeCloseFindNotification
              • String ID:
              • API String ID: 2591292051-0
              • Opcode ID: f1c7ff85c96590c13e9cd3a5eb647ed670b61d425a57ae8e40b432efae5264ec
              • Instruction ID: 34f1e753768f7587e49661422ff58cb4b23cb35e4510ec23c0ce51fb46d1b32c
              • Opcode Fuzzy Hash: f1c7ff85c96590c13e9cd3a5eb647ed670b61d425a57ae8e40b432efae5264ec
              • Instruction Fuzzy Hash: 5F21C2B55093C09FDB128F29DC95652BFB8EF07320F0984DBDD858F6A3D2649908CB62
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1236 bfa61e-bfa688 1238 bfa68a-bfa692 OleInitialize 1236->1238 1239 bfa6c0-bfa6c5 1236->1239 1241 bfa698-bfa6aa 1238->1241 1239->1238 1242 bfa6ac-bfa6bf 1241->1242 1243 bfa6c7-bfa6cc 1241->1243 1243->1242
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1662736654.0000000000BFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BFA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_bfa000_JawnEmT6S2.jbxd
              Similarity
              • API ID: Initialize
              • String ID:
              • API String ID: 2538663250-0
              • Opcode ID: 5a075b0d87e1e8288667edb0eb300610a633f9839d6aa289c46809baa1c16acd
              • Instruction ID: a1fc53dfe3a97a2c15d6f12853c7260a5d380f0ef77d630de78d2db6e0c21959
              • Opcode Fuzzy Hash: 5a075b0d87e1e8288667edb0eb300610a633f9839d6aa289c46809baa1c16acd
              • Instruction Fuzzy Hash: EE2115B15093C46FDB128B259C94A52BFB4DF07224F0984DBD9848F6A3D2699908CBA2
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1245 bfa573-bfa5d6 1247 bfa5d8-bfa5e0 DuplicateHandle 1245->1247 1248 bfa610-bfa615 1245->1248 1250 bfa5e6-bfa5f8 1247->1250 1248->1247 1251 bfa5fa-bfa60d 1250->1251 1252 bfa617-bfa61c 1250->1252 1252->1251
              APIs
              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00BFA5DE
              Memory Dump Source
              • Source File: 00000000.00000002.1662736654.0000000000BFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BFA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_bfa000_JawnEmT6S2.jbxd
              Similarity
              • API ID: DuplicateHandle
              • String ID:
              • API String ID: 3793708945-0
              • Opcode ID: 6676a00b97c95389d0846d427cd6a72cb15741c1488beaef06e9b630aee8f64b
              • Instruction ID: a22bfcf88e4345a9dc117ee5b9f2c48b967024b0538f380dcac66e2003afbcc3
              • Opcode Fuzzy Hash: 6676a00b97c95389d0846d427cd6a72cb15741c1488beaef06e9b630aee8f64b
              • Instruction Fuzzy Hash: 2111B771404380AFDB228F55DC44B62FFF4EF4A310F0888DAED858B552C235A918DB61
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1254 bfaeae-bfaf05 1257 bfaf49-bfaf4e 1254->1257 1258 bfaf07-bfaf0f WriteFile 1254->1258 1257->1258 1260 bfaf15-bfaf27 1258->1260 1261 bfaf29-bfaf46 1260->1261 1262 bfaf50-bfaf55 1260->1262 1262->1261
              APIs
              • WriteFile.KERNELBASE(?,00000E24,D83BCAC2,00000000,00000000,00000000,00000000), ref: 00BFAF0D
              Memory Dump Source
              • Source File: 00000000.00000002.1662736654.0000000000BFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BFA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_bfa000_JawnEmT6S2.jbxd
              Similarity
              • API ID: FileWrite
              • String ID:
              • API String ID: 3934441357-0
              • Opcode ID: 9facdf4dab03aa7c5efeae232f9edb35745b11e0a491a181483ff413cc2c04d5
              • Instruction ID: 5c1f0b82e8856191f6febbba40a2d5e7d66133eb10eec16d9c3c2e174d029e1f
              • Opcode Fuzzy Hash: 9facdf4dab03aa7c5efeae232f9edb35745b11e0a491a181483ff413cc2c04d5
              • Instruction Fuzzy Hash: 2C11B6B1500204AFE721CF55DD84FA6FBE8EF04314F0488AAEA499BA51D374A508CBB2
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • ShellExecuteExW.SHELL32(?), ref: 00BFB480
              Memory Dump Source
              • Source File: 00000000.00000002.1662736654.0000000000BFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BFA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_bfa000_JawnEmT6S2.jbxd
              Similarity
              • API ID: ExecuteShell
              • String ID:
              • API String ID: 587946157-0
              • Opcode ID: c1a151e89756fc99b473a92d3f95f12cc035ca7faf0574cfde6a2aaab02635c2
              • Instruction ID: 450e5cea43e3c800798eb11f2cdff91943932d7414a82e807882a83a50abc999
              • Opcode Fuzzy Hash: c1a151e89756fc99b473a92d3f95f12cc035ca7faf0574cfde6a2aaab02635c2
              • Instruction Fuzzy Hash: C51160715093849FD712CF25DD94B52BFF8DF46220F0884EAED89CB653D268A908CB61
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetFileType.KERNELBASE(?,00000E24,D83BCAC2,00000000,00000000,00000000,00000000), ref: 00BFACBD
              Memory Dump Source
              • Source File: 00000000.00000002.1662736654.0000000000BFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BFA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_bfa000_JawnEmT6S2.jbxd
              Similarity
              • API ID: FileType
              • String ID:
              • API String ID: 3081899298-0
              • Opcode ID: ed8c5921a8e2b052de1692f9ba2df3bc430781ae1cb0ef243b475ecab7abafae
              • Instruction ID: f7b6b0edea5306c386686d5eb58c345eda1229b70a6f84202da744ee5cd28637
              • Opcode Fuzzy Hash: ed8c5921a8e2b052de1692f9ba2df3bc430781ae1cb0ef243b475ecab7abafae
              • Instruction Fuzzy Hash: A801C4B1500204AFE720CB09DD85BB6B7E8DF04724F14C4A6EE088B741D774A948CBB2
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • ShellExecuteExW.SHELL32(?), ref: 00BFB480
              Memory Dump Source
              • Source File: 00000000.00000002.1662736654.0000000000BFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BFA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_bfa000_JawnEmT6S2.jbxd
              Similarity
              • API ID: ExecuteShell
              • String ID:
              • API String ID: 587946157-0
              • Opcode ID: 19f028a8f99688954b3bb21f8b7f96d78f2005cba266c80b905a9b60ebf09110
              • Instruction ID: 8f20e5a8f2db858d138fdd8126fed38784852dc36bee3cee8a80b92bafc98917
              • Opcode Fuzzy Hash: 19f028a8f99688954b3bb21f8b7f96d78f2005cba266c80b905a9b60ebf09110
              • Instruction Fuzzy Hash: C90140716042449FDB10CF1ADA85B66FBE4EF04721F08C4AADE49CB756D778E908CB61
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00BFA5DE
              Memory Dump Source
              • Source File: 00000000.00000002.1662736654.0000000000BFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BFA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_bfa000_JawnEmT6S2.jbxd
              Similarity
              • API ID: DuplicateHandle
              • String ID:
              • API String ID: 3793708945-0
              • Opcode ID: 81379758b7a11370cd650541e0bd373057b4e74b864d169579113abd50fd2538
              • Instruction ID: bb1ba802f783f8ce2cbef4f986881e9eb5747716d3649d546131fea826cce427
              • Opcode Fuzzy Hash: 81379758b7a11370cd650541e0bd373057b4e74b864d169579113abd50fd2538
              • Instruction Fuzzy Hash: 42016172500604AFDB21CF55D944B66FFE0EF48720F08C9AADE498BA52D375E418DF62
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • FindCloseChangeNotification.KERNELBASE(?), ref: 00BFABF0
              Memory Dump Source
              • Source File: 00000000.00000002.1662736654.0000000000BFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BFA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_bfa000_JawnEmT6S2.jbxd
              Similarity
              • API ID: ChangeCloseFindNotification
              • String ID:
              • API String ID: 2591292051-0
              • Opcode ID: b6a00507f5ece4a39795d86a1c0cb4527a0aa0411fe9de1c486f17b4ac8cd8c0
              • Instruction ID: 6d347aeb90bc9cb3416870ce0814710cdfc19409fe0dca6f4f116485f5517745
              • Opcode Fuzzy Hash: b6a00507f5ece4a39795d86a1c0cb4527a0aa0411fe9de1c486f17b4ac8cd8c0
              • Instruction Fuzzy Hash: D8018FB56042449FDB20CF1ADD85766FBE4DF04321F08C4AADE498BA56D279E908CB62
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • OleGetClipboard.OLE32(?,00000E24,?,?), ref: 00BFA77E
              Memory Dump Source
              • Source File: 00000000.00000002.1662736654.0000000000BFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BFA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_bfa000_JawnEmT6S2.jbxd
              Similarity
              • API ID: Clipboard
              • String ID:
              • API String ID: 220874293-0
              • Opcode ID: c4f7c4b9133b4e910f2617f7e4b0eee0e17f46cafddbf5c3f264c5038a038100
              • Instruction ID: 54dc5cbb0edce85af61f8192ddc12e3cb072a1fb0574450342051566b5912b3a
              • Opcode Fuzzy Hash: c4f7c4b9133b4e910f2617f7e4b0eee0e17f46cafddbf5c3f264c5038a038100
              • Instruction Fuzzy Hash: C301D671600600AFD320DF1ACD46B66FBE8FB88A20F148159EC089BB41D771F915CBE5
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1662736654.0000000000BFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BFA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_bfa000_JawnEmT6S2.jbxd
              Similarity
              • API ID: Initialize
              • String ID:
              • API String ID: 2538663250-0
              • Opcode ID: ffd1700344ba8ffa38b9f115dca67f1e5141bc8b7550c8ec8204849011f71048
              • Instruction ID: ec9a76843211c036a6f5afd5f92dafd406833d1985676554c267b229353e353d
              • Opcode Fuzzy Hash: ffd1700344ba8ffa38b9f115dca67f1e5141bc8b7550c8ec8204849011f71048
              • Instruction Fuzzy Hash: BC0162B1504244AFDB20CF59D984766FBE4DF44321F0CC4EADD498F656D279A908CFA2
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • SetErrorMode.KERNELBASE(?), ref: 00BFAA44
              Memory Dump Source
              • Source File: 00000000.00000002.1662736654.0000000000BFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BFA000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_bfa000_JawnEmT6S2.jbxd
              Similarity
              • API ID: ErrorMode
              • String ID:
              • API String ID: 2340568224-0
              • Opcode ID: 0e9155dc19249e09466dd8797c67431559d2c718db268821fc8aba1353c5dc6c
              • Instruction ID: 3ca4d17e30d813c0bbb18c464dedd7b9447cb4630484aa314df4f5e79dc303f2
              • Opcode Fuzzy Hash: 0e9155dc19249e09466dd8797c67431559d2c718db268821fc8aba1353c5dc6c
              • Instruction Fuzzy Hash: 60F0A4755006449FDB20CF09DA84765FBE0DF04725F08C0EADE494BB52D279A90CCF62
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.1663816528.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_4cd0000_JawnEmT6S2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f33b5a9b33e72971e6d7fd5df22ca2ac31da31e653cd99af5efd3b4177bd7fb5
              • Instruction ID: 8aa4b9e6f5d2ef5f76dec80050bbbef233610b6e4d1db1103b5b89a3f37b56b7
              • Opcode Fuzzy Hash: f33b5a9b33e72971e6d7fd5df22ca2ac31da31e653cd99af5efd3b4177bd7fb5
              • Instruction Fuzzy Hash: 43324A30A10218CFDB24EF75D855BEDB7B2EB48304F1045AAD509AB3A5DB799E85CF80
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.1663816528.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_4cd0000_JawnEmT6S2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 5b981d7581f684bfcdcf36d1c904740997f80de393f67ed49bdb0ae9ae618215
              • Instruction ID: be5c56dccc185afe68f9c48d4d851ff4147b2a9f419a93dbebd289543317169e
              • Opcode Fuzzy Hash: 5b981d7581f684bfcdcf36d1c904740997f80de393f67ed49bdb0ae9ae618215
              • Instruction Fuzzy Hash: 70815B30A002588FDB14EFB4D851BECB7B2EF85308F1045AAD50AAB2A4DB799D85CF51
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.1663816528.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_4cd0000_JawnEmT6S2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 09e4b0bf885725e59bd51b91421dfd3e69f30fa085a1c4bc3a20fa19086aa2ff
              • Instruction ID: 0fb859a95c219c336e6002e08f254cf798a61971fb8a924f7f24f3f90066c9d8
              • Opcode Fuzzy Hash: 09e4b0bf885725e59bd51b91421dfd3e69f30fa085a1c4bc3a20fa19086aa2ff
              • Instruction Fuzzy Hash: 39417F30A00258CFDB14EFB5D911BECB7B2EF44308F1041AAD009AB2A5DB795E84CF52
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.1663816528.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_4cd0000_JawnEmT6S2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d3ca7ef8e65c548efbc7030b557a424540f6c6b0b1a4122fb0f5dd5cb97989f1
              • Instruction ID: 0453ea56ebef32bf91c5a0f27416519ca31990d4c221aaebdc60cea7e7372e7b
              • Opcode Fuzzy Hash: d3ca7ef8e65c548efbc7030b557a424540f6c6b0b1a4122fb0f5dd5cb97989f1
              • Instruction Fuzzy Hash: 1D31A030B102115FDB14BB7AD8127BE72A7EF88208F14443AD506977A5DF39A9168BD1
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.1663816528.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_4cd0000_JawnEmT6S2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d4afc841993e88e2beb27dd3ba5dddcff809e32c1e0595716df81d01c0a18113
              • Instruction ID: 4b1037ad9a3cbbf74def2819be55397e7dd5125306841e329dc86afdd7616d82
              • Opcode Fuzzy Hash: d4afc841993e88e2beb27dd3ba5dddcff809e32c1e0595716df81d01c0a18113
              • Instruction Fuzzy Hash: 4011EEA140F3C25FD7034B3298652943F70AF53218B4A45EBD080CBAA7E29C1A0EDB62
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.1663816528.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_4cd0000_JawnEmT6S2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 319cfd444f7a0d264f64bb98a70f50480764c5b84474565071674b8b7635cf41
              • Instruction ID: 27e435adef8ea3034abe0c4c4b85ca47fd7caddb8ab8bb2b0d709959c08ca95b
              • Opcode Fuzzy Hash: 319cfd444f7a0d264f64bb98a70f50480764c5b84474565071674b8b7635cf41
              • Instruction Fuzzy Hash: 7401C0317042405FC324F77AA462AAD23979BC6348724587DD001AB796CFAE9C0E8792
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.1663816528.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_4cd0000_JawnEmT6S2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 7579010ae830f6c4ccdf950854bed4aaee5ab11c8f4b49e7a2c765bc2bb8dc1e
              • Instruction ID: 21591cee7b3fdb7d1287407a663a936a72fbf85c16f97d9e0a1a9367f604c48f
              • Opcode Fuzzy Hash: 7579010ae830f6c4ccdf950854bed4aaee5ab11c8f4b49e7a2c765bc2bb8dc1e
              • Instruction Fuzzy Hash: CB0192317002005BC324F77A9462AA9228B97C6348754587DD001AB795CFBD9C4A87D2
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.1662982392.0000000000E00000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_e00000_JawnEmT6S2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0e697f070ba4ad4e6c58f50f21aae86e16e4f6be02add991ee8c9fff890569a4
              • Instruction ID: 468ffeb89d20e94ddd2ee2a86b08316fc239d398d9df2b4c09549f66f47a1b49
              • Opcode Fuzzy Hash: 0e697f070ba4ad4e6c58f50f21aae86e16e4f6be02add991ee8c9fff890569a4
              • Instruction Fuzzy Hash: C2F08BB65097806FD711CF15DC40863FFA8DB46620709C49FFC498B652D125A904C775
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.1663816528.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_4cd0000_JawnEmT6S2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 369e3bc36c5880751943ae371692de5b36ed530611e1d662651e80d019c6ffaa
              • Instruction ID: 579310486763a55d087d122ca49d4f2a61cce5ddfc5099ded978ba0e7c253d19
              • Opcode Fuzzy Hash: 369e3bc36c5880751943ae371692de5b36ed530611e1d662651e80d019c6ffaa
              • Instruction Fuzzy Hash: A6F0F631A44344AFEB05DB708C12BAE7F779F82214F1485AAD645DB1D2DA355842C391
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.1663816528.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_4cd0000_JawnEmT6S2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9768b9337782833abc6f108a3b01bf9d6362f35ee5e66f8e39a639633b4b96cb
              • Instruction ID: 6a7063139bef533c79bfacbcd867c5064125d2118bfab18fceaeb4f4c7c1594f
              • Opcode Fuzzy Hash: 9768b9337782833abc6f108a3b01bf9d6362f35ee5e66f8e39a639633b4b96cb
              • Instruction Fuzzy Hash: 8DF0B431A40304ABEF14DAB49852BEE7B629B80314F20816DD506AB1C0DA3259418780
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.1662982392.0000000000E00000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_e00000_JawnEmT6S2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 24d3e9b3a8d44720f1e4cab98bfa59730f1cf3b9a58ead8a797f9e3aaf6e0ac1
              • Instruction ID: e54691cfdabf1c3b4d204072c1349767c3453b8527b8bf01a73448d4d0362fa4
              • Opcode Fuzzy Hash: 24d3e9b3a8d44720f1e4cab98bfa59730f1cf3b9a58ead8a797f9e3aaf6e0ac1
              • Instruction Fuzzy Hash: A5E092B66006005FD660CF0EEC41456F7D8EB84630B08C47FDC0D8BB01E276B909CAA5
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.1662723254.0000000000BF2000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF2000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_bf2000_JawnEmT6S2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 5e35946aa9a22ed60fa895130d7835fd2a96bdf7bded551860ac7cb217fd4eef
              • Instruction ID: 9e199c621e02cfff953e9f35f60a1208cb23faf3ce224097e36ffb1efc202c7e
              • Opcode Fuzzy Hash: 5e35946aa9a22ed60fa895130d7835fd2a96bdf7bded551860ac7cb217fd4eef
              • Instruction Fuzzy Hash: E7D02E392006C04FD3238B0CC2A5BA537D4AB80704F0A04FAA800CB763C7A8D884C200
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.1663816528.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_4cd0000_JawnEmT6S2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 04985d5a4c898a773fd1dc10cb05f2647d29896fff599bdf42a7e8e5a5911c38
              • Instruction ID: ef6d396547be75f5f07beb07795460a821c65ea43ee68a350b3564749072e641
              • Opcode Fuzzy Hash: 04985d5a4c898a773fd1dc10cb05f2647d29896fff599bdf42a7e8e5a5911c38
              • Instruction Fuzzy Hash: 22D0C770262314CFC71D2B74A41982D336AAB8930D35004BDD8065B764DF7AD456CA81
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.1662723254.0000000000BF2000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF2000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_bf2000_JawnEmT6S2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9365664e1d67e91de23275c0a5272e2b64312bc58634eaf5d8ce89acde314ab5
              • Instruction ID: 902a1dc7b695a083baad8efb59eebe40314df2fca1a6fed3577620e985bf21b7
              • Opcode Fuzzy Hash: 9365664e1d67e91de23275c0a5272e2b64312bc58634eaf5d8ce89acde314ab5
              • Instruction Fuzzy Hash: 54D05E742006854FC725DB0CC2D4F6937D4AB44714F0644E8AC108B762C7B8D8C8DA00
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1663816528.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_4cd0000_JawnEmT6S2.jbxd
              Similarity
              • API ID:
              • String ID: $|t
              • API String ID: 0-1654681884
              • Opcode ID: 5063c548fb86cdc7ccbb2d66d8e0e1a243c2ea38793911506553798f0acb7c2e
              • Instruction ID: c4730a21a815cbee938502c71dffb0f213f5e407849728baa5e1cceeef44d9fc
              • Opcode Fuzzy Hash: 5063c548fb86cdc7ccbb2d66d8e0e1a243c2ea38793911506553798f0acb7c2e
              • Instruction Fuzzy Hash: 09035E74A11228CFDB25EF35D864BA9B7B2FB48304F1081EAD90967395DB359E81CF90
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1663816528.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_4cd0000_JawnEmT6S2.jbxd
              Similarity
              • API ID:
              • String ID: $|t
              • API String ID: 0-1654681884
              • Opcode ID: 9fe8d4bfcc5ada0a090ee9b1ec063badcc6c2d07d017f7263a68a3c9e369375a
              • Instruction ID: b57a77595bcc367cb83936029cdaf08c14ded7b7c2a07f08dcef8433d870d6bf
              • Opcode Fuzzy Hash: 9fe8d4bfcc5ada0a090ee9b1ec063badcc6c2d07d017f7263a68a3c9e369375a
              • Instruction Fuzzy Hash: 98036E74A11228CFDB25EF35D864BA9B7B2FB48304F1081EAD90967395DB359E81CF90
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1663816528.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_4cd0000_JawnEmT6S2.jbxd
              Similarity
              • API ID:
              • String ID: $|t
              • API String ID: 0-1654681884
              • Opcode ID: b5d20849b7cfe30e06c9b86ec134ccf6aa8695d923328cdf5148f22f619d85c2
              • Instruction ID: d66803cc5c2542bd4b9433feb90de1cdf008a737ee59848f0beaef3ecd95738e
              • Opcode Fuzzy Hash: b5d20849b7cfe30e06c9b86ec134ccf6aa8695d923328cdf5148f22f619d85c2
              • Instruction Fuzzy Hash: A5035E74A11228CFDB25EF35D864BA9B7B2FB48304F1041EAD90967395DB399E81CF90
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1663816528.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_4cd0000_JawnEmT6S2.jbxd
              Similarity
              • API ID:
              • String ID: $|t
              • API String ID: 0-1654681884
              • Opcode ID: b33d006c7908e42f885b17a5ad340dd7fd161a9f32bd48d5864b7c405ba68ab6
              • Instruction ID: e155c9ffa5e3143f189e925e146a7ad0b45cf5df0e4aef61d77b4590dff54440
              • Opcode Fuzzy Hash: b33d006c7908e42f885b17a5ad340dd7fd161a9f32bd48d5864b7c405ba68ab6
              • Instruction Fuzzy Hash: C2F26E74A11228CFDB25EF35D864BA9B7B2FB48304F1081EAD90967395DB359E81CF90
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1663816528.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_4cd0000_JawnEmT6S2.jbxd
              Similarity
              • API ID:
              • String ID: $|t
              • API String ID: 0-1654681884
              • Opcode ID: fa8e846b650249a7d0f9150906ef1cd130697c0d6f0ec95fcd03e6407ebcd612
              • Instruction ID: 03580d38819df68de6dffea47730c28af4c9be3c40e2feaa83be08a9b947924b
              • Opcode Fuzzy Hash: fa8e846b650249a7d0f9150906ef1cd130697c0d6f0ec95fcd03e6407ebcd612
              • Instruction Fuzzy Hash: 0EF26E74A11228CFDB25EF35D864BA9B7B2FB48304F1081EAD90967395DB359E81CF90
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1663816528.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_4cd0000_JawnEmT6S2.jbxd
              Similarity
              • API ID:
              • String ID: $|t
              • API String ID: 0-1654681884
              • Opcode ID: d1aec73484b89ceebf3d961069224822a7898a38562922b4b3e959d95369869f
              • Instruction ID: d75cd7a4f92d4ea44827176b48b024b04a0441bb627a940c919740a02cadab62
              • Opcode Fuzzy Hash: d1aec73484b89ceebf3d961069224822a7898a38562922b4b3e959d95369869f
              • Instruction Fuzzy Hash: B8F26D74A11228CFDB25EF35D864BA9B7B2FB48304F1081EAD90967395DB359E81CF90
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1663816528.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_4cd0000_JawnEmT6S2.jbxd
              Similarity
              • API ID:
              • String ID: $|t
              • API String ID: 0-1654681884
              • Opcode ID: e1482b8c1af611d4fb7bcc472b94ed4b45debec3a25809a039934ca25a1337f9
              • Instruction ID: 7ef5493bd61d449b8ceb92397545268cd8f24438d302cafb3882b8ec910d7ffb
              • Opcode Fuzzy Hash: e1482b8c1af611d4fb7bcc472b94ed4b45debec3a25809a039934ca25a1337f9
              • Instruction Fuzzy Hash: 65F26D74A11228CFDB25EF35D864BA9B7B2FB48304F1081EAD90967395DB359E81CF90
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1663816528.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_4cd0000_JawnEmT6S2.jbxd
              Similarity
              • API ID:
              • String ID: $|t
              • API String ID: 0-1654681884
              • Opcode ID: 160ba2f97ddc1b2b0fc7b7d1683b18f6b09bb97401cb31d2ba66d95a0df78338
              • Instruction ID: 6605cb46609450531c575fadee4afe2feb43918c3e0d33dc34175877471e9657
              • Opcode Fuzzy Hash: 160ba2f97ddc1b2b0fc7b7d1683b18f6b09bb97401cb31d2ba66d95a0df78338
              • Instruction Fuzzy Hash: 21F26D74A11228CFDB25EF35D864BA9B7B2FB48304F1081EAD90967395DB359E81CF90
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1663816528.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_4cd0000_JawnEmT6S2.jbxd
              Similarity
              • API ID:
              • String ID: $|t
              • API String ID: 0-1654681884
              • Opcode ID: d3d01f22aa9c0b614bcde421d455ef46999462a28d695efe5cb6393de0695741
              • Instruction ID: 03f81c5c448ec9e13aeaf2f0a65dfe6aefcc675ca301646d4ffc0ba1c76a95a7
              • Opcode Fuzzy Hash: d3d01f22aa9c0b614bcde421d455ef46999462a28d695efe5cb6393de0695741
              • Instruction Fuzzy Hash: C0E26C74A01228CFDB25EF35D964BA9B7B2FB48304F1081EAD90967395DB359E81CF90
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1663816528.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_4cd0000_JawnEmT6S2.jbxd
              Similarity
              • API ID:
              • String ID: |t
              • API String ID: 0-1785604035
              • Opcode ID: 7e909590a1902f2a8fb7d369b8d78e22c84bee446babac61dbf204cd9922ad2c
              • Instruction ID: d54f6c8882b441d41a0d61102e490550efe77966be4b96f5064fd84a50c1fc77
              • Opcode Fuzzy Hash: 7e909590a1902f2a8fb7d369b8d78e22c84bee446babac61dbf204cd9922ad2c
              • Instruction Fuzzy Hash: DFE26D74A11228CFDB25EF35D864BA9B7B2FB48304F1081EAD90967395DB359E81CF90
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1663816528.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_4cd0000_JawnEmT6S2.jbxd
              Similarity
              • API ID:
              • String ID: |t
              • API String ID: 0-1785604035
              • Opcode ID: f831173ec4cd8fe2bd0f9d2ece8b872e0255bd06d36aaedaa5e6629f12412776
              • Instruction ID: 8d38f1cc5426d489f933c72ddd1ff5bdd0f577028532b9e75e2fe646fda90a18
              • Opcode Fuzzy Hash: f831173ec4cd8fe2bd0f9d2ece8b872e0255bd06d36aaedaa5e6629f12412776
              • Instruction Fuzzy Hash: 0DD25C74A11228CFDB25EF35D864BA9B7B2FB48304F1081EAD90967395DB359E81CF90
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1663816528.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_4cd0000_JawnEmT6S2.jbxd
              Similarity
              • API ID:
              • String ID: |t
              • API String ID: 0-1785604035
              • Opcode ID: 978942f8b7c10b3274a558ba30839ff2ac2f54ce90a43b8eb0e9f1cd59413b10
              • Instruction ID: d9abfd3e315cd6c2c3082068da06fc2cec57f4b91397cf7d23249f182922b323
              • Opcode Fuzzy Hash: 978942f8b7c10b3274a558ba30839ff2ac2f54ce90a43b8eb0e9f1cd59413b10
              • Instruction Fuzzy Hash: 30D25C74A11228CFDB25EF35D864BA9B7B2FB48304F1081EAD90967395DB359E81CF90
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1663816528.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_4cd0000_JawnEmT6S2.jbxd
              Similarity
              • API ID:
              • String ID: |t
              • API String ID: 0-1785604035
              • Opcode ID: bd9a442cc2edabbfca2ccdd4b277792e512a32c1fe4fea190876e027403fb76b
              • Instruction ID: 05de0d90410581955d979b1e691fb4d331b53b079e40d23e1c07df0c46a83432
              • Opcode Fuzzy Hash: bd9a442cc2edabbfca2ccdd4b277792e512a32c1fe4fea190876e027403fb76b
              • Instruction Fuzzy Hash: C6D25C74A11228CFDB25EF35D864BA9B7B2FB48304F1081EAD90967395DB359E81CF90
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1663816528.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_4cd0000_JawnEmT6S2.jbxd
              Similarity
              • API ID:
              • String ID: |t
              • API String ID: 0-1785604035
              • Opcode ID: 50661b14c5d2226e3a7124f397bc8e32b5d6b8965aeef7030b9e01e8b4272f4b
              • Instruction ID: 7ce3e3344d4a995814816331806ea8b11bb7a8dcb984ca0ce6924cd97fbf96a5
              • Opcode Fuzzy Hash: 50661b14c5d2226e3a7124f397bc8e32b5d6b8965aeef7030b9e01e8b4272f4b
              • Instruction Fuzzy Hash: C1D26D74A11228CFDB25EF35D864BA9B7B2FB48304F1081EAD90967395DB359E81CF90
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1663816528.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_4cd0000_JawnEmT6S2.jbxd
              Similarity
              • API ID:
              • String ID: |t
              • API String ID: 0-1785604035
              • Opcode ID: bbe068ffabe40955fb4daca45a3144def869faae944fd23101dc11ab94ed15a8
              • Instruction ID: b32b42dfb267280c39aacc8d8cabaf274e006eee97bdb956c6e94e98e87e9ef7
              • Opcode Fuzzy Hash: bbe068ffabe40955fb4daca45a3144def869faae944fd23101dc11ab94ed15a8
              • Instruction Fuzzy Hash: 32D25D74A11228CFDB25EF35D864BA9B7B2FB48304F1081EAD90967395DB359E81CF90
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1663816528.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_4cd0000_JawnEmT6S2.jbxd
              Similarity
              • API ID:
              • String ID: |t
              • API String ID: 0-1785604035
              • Opcode ID: de81fb302780b69b72a79a1a1c0415c65d961fc5d07e1a623207c1bda323e184
              • Instruction ID: 07561fc0b3731315b4d0d742c7c66a82d650656ecc81480aa4397c88ae77c63b
              • Opcode Fuzzy Hash: de81fb302780b69b72a79a1a1c0415c65d961fc5d07e1a623207c1bda323e184
              • Instruction Fuzzy Hash: F5C23C74A01228CFDB25EF34D965BA9B7B2FB49304F1081EAD90967395DB359E81CF80
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1663816528.0000000004CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_4cd0000_JawnEmT6S2.jbxd
              Similarity
              • API ID:
              • String ID: N$N$N$N
              • API String ID: 0-91100018
              • Opcode ID: d9f1cd6c658b28d7a00c926b67d6a9dad5eafa10e09ae27d3302ce502469ec87
              • Instruction ID: 7d397f1b3cc779fa414a0c13f0bb780c14254df42d743da088c89bdb068524f7
              • Opcode Fuzzy Hash: d9f1cd6c658b28d7a00c926b67d6a9dad5eafa10e09ae27d3302ce502469ec87
              • Instruction Fuzzy Hash: 9B2151757012499FEB20DF69C981BAA73E6FF89344F150468E901EB794EB70FD048791
              Uniqueness

              Uniqueness Score: -1.00%

              Execution Graph

              Execution Coverage:20.9%
              Dynamic/Decrypted Code Coverage:100%
              Signature Coverage:2.8%
              Total number of Nodes:108
              Total number of Limit Nodes:6
              execution_graph 20083 91aa12 20084 91aa67 20083->20084 20085 91aa3e SetErrorMode 20083->20085 20084->20085 20086 91aa53 20085->20086 20087 91a696 20088 91a6e6 OleGetClipboard 20087->20088 20089 91a6f4 20088->20089 20169 91a45a 20170 91a4d0 20169->20170 20171 91a498 DuplicateHandle 20169->20171 20170->20171 20172 91a4a6 20171->20172 20173 91b45a 20176 91b495 SendMessageTimeoutA 20173->20176 20175 91b4dd 20176->20175 20090 4fa2bf6 20093 4fa2c2b GetProcessWorkingSetSize 20090->20093 20092 4fa2c57 20093->20092 20094 4fa2876 20095 4fa28ae RegCreateKeyExW 20094->20095 20097 4fa2920 20095->20097 20177 4fa13b6 20179 4fa13ee ConvertStringSecurityDescriptorToSecurityDescriptorW 20177->20179 20180 4fa142f 20179->20180 20098 91a51e 20099 91a580 20098->20099 20100 91a54a FindCloseChangeNotification 20098->20100 20099->20100 20101 91a558 20100->20101 20102 4fa00ea 20105 4fa0119 AdjustTokenPrivileges 20102->20105 20104 4fa013b 20105->20104 20106 91b982 20107 91b9ab SetFileAttributesW 20106->20107 20109 91b9c7 20107->20109 20181 91bf42 20182 91bf6b LookupPrivilegeValueW 20181->20182 20184 91bf92 20182->20184 20113 91a186 20114 91a1f3 20113->20114 20115 91a1bb send 20113->20115 20114->20115 20116 91a1c9 20115->20116 20117 91b806 20118 91b82f CopyFileW 20117->20118 20120 91b856 20118->20120 20185 4fa2b22 20187 4fa2b4b select 20185->20187 20188 4fa2b80 20187->20188 20121 4fa1566 20122 4fa159e MapViewOfFile 20121->20122 20124 4fa15ed 20122->20124 20189 4fa1ca6 20191 4fa1cdb WSAConnect 20189->20191 20192 4fa1cfa 20191->20192 20193 91bace 20194 91bafa FindClose 20193->20194 20195 91bb2c 20193->20195 20196 91bb0f 20194->20196 20195->20194 20197 91b8ce 20198 91b8f4 DeleteFileW 20197->20198 20200 91b910 20198->20200 20125 4fa19da 20127 4fa1a0f GetProcessTimes 20125->20127 20128 4fa1a41 20127->20128 20129 4fa2cda 20132 4fa2d0f SetProcessWorkingSetSize 20129->20132 20131 4fa2d3b 20132->20131 20201 91b372 20202 91b3a7 RegSetValueExW 20201->20202 20204 91b3f3 20202->20204 20133 4fa035e 20135 4fa0393 GetExitCodeProcess 20133->20135 20136 4fa03bc 20135->20136 20205 91b176 20206 91b1ae RegOpenKeyExW 20205->20206 20208 91b204 20206->20208 20137 4fa1f52 20140 4fa1f8d LoadLibraryA 20137->20140 20139 4fa1fca 20140->20139 20209 91b27e 20210 91b2b3 RegQueryValueExW 20209->20210 20212 91b307 20210->20212 20213 4fa0f8a 20216 4fa0fc2 WSASocketW 20213->20216 20215 4fa0ffe 20216->20215 20217 4fa180a 20218 4fa183f shutdown 20217->20218 20220 4fa1868 20218->20220 20149 91aaa6 20151 91aade CreateFileW 20149->20151 20152 91ab2d 20151->20152 20153 91afaa 20156 91afe2 CreateMutexW 20153->20156 20155 91b025 20156->20155 20221 91ac6a 20223 91ac9f GetFileType 20221->20223 20224 91accc 20223->20224 20157 4fa1ac6 20158 4fa1b01 getaddrinfo 20157->20158 20160 4fa1b73 20158->20160 20161 4fa2a46 20164 4fa2a7b ioctlsocket 20161->20164 20163 4fa2aa7 20164->20163 20225 bf02c0 20228 bf02dc 20225->20228 20226 bf043d 20227 bf00b8 GetLogicalDrives GetLogicalDrives 20227->20228 20228->20226 20228->20227 20229 91adee 20231 91ae23 WriteFile 20229->20231 20232 91ae55 20231->20232

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 0 bf4298-bf42c9 3 bf42cf-bf4350 0->3 4 bf4352-bf435a 0->4 3->4 32 bf435c 3->32 5 bf4366-bf437a 4->5 7 bf452f-bf467d 5->7 8 bf4380-bf43bc 5->8 45 bf480d-bf4821 7->45 46 bf4683-bf47d2 7->46 19 bf43be-bf43e6 8->19 20 bf43ed-bf44ef 8->20 19->20 20->7 32->5 47 bf496f-bf4983 45->47 48 bf4827-bf4934 45->48 46->45 51 bf49d6-bf49ea 47->51 52 bf4985-bf498b call bf4210 47->52 48->47 54 bf49ec-bf49f7 51->54 55 bf4a32-bf4a46 51->55 61 bf4990-bf499b 52->61 54->55 58 bf4a4c-bf4b51 55->58 59 bf4b94-bf4ba8 55->59 289 bf4b59 58->289 63 bf4bae-bf4bc2 59->63 64 bf4cd4-bf4ce8 59->64 61->51 67 bf4bc4-bf4bcb 63->67 68 bf4bd0-bf4be4 63->68 72 bf4cee-bf4f22 64->72 73 bf4f74-bf4f88 64->73 77 bf4c48-bf4c5c 67->77 74 bf4bef-bf4c03 68->74 75 bf4be6-bf4bed 68->75 548 bf4f2d 72->548 78 bf4f8a-bf4f91 73->78 79 bf4fe2-bf4ff6 73->79 80 bf4c0e-bf4c22 74->80 81 bf4c05-bf4c0c 74->81 75->77 84 bf4c5e-bf4c74 77->84 85 bf4c76-bf4c82 77->85 106 bf4f9b 78->106 82 bf4ff8 79->82 83 bf5045-bf5059 79->83 90 bf4c2d-bf4c41 80->90 91 bf4c24-bf4c2b 80->91 81->77 556 bf4ff8 call c005e1 82->556 557 bf4ff8 call c00606 82->557 558 bf4ff8 call bf7461 82->558 559 bf4ff8 call bf7310 82->559 92 bf505b 83->92 93 bf50a2-bf50b6 83->93 95 bf4c8d 84->95 85->95 90->77 102 bf4c43-bf4c45 90->102 91->77 92->93 99 bf512d-bf5141 93->99 100 bf50b8-bf50e1 93->100 95->64 98 bf4ffe 98->83 107 bf5147-bf5363 99->107 108 bf53b4-bf53c8 99->108 100->99 102->77 106->79 489 bf5367 107->489 490 bf5365 107->490 114 bf549e-bf54b2 108->114 115 bf53ce-bf5457 108->115 119 bf566f-bf5683 114->119 120 bf54b8-bf5628 114->120 115->114 126 bf5689-bf579f 119->126 127 bf57e6-bf57fa 119->127 120->119 126->127 133 bf595d-bf5971 127->133 134 bf5800-bf5916 127->134 137 bf5977-bf5a8d 133->137 138 bf5ad4-bf5ae8 133->138 134->133 137->138 144 bf5aee-bf5c04 138->144 145 bf5c4b-bf5c5f 138->145 144->145 151 bf5c65-bf5d7b 145->151 152 bf5dc2-bf5dd6 145->152 151->152 158 bf5ddc-bf5ef2 152->158 159 bf5f39-bf5f4d 152->159 158->159 165 bf5f53-bf6069 159->165 166 bf60b0-bf60c4 159->166 165->166 180 bf60ca-bf61e0 166->180 181 bf6227-bf623b 166->181 180->181 189 bf639e-bf63b2 181->189 190 bf6241-bf6357 181->190 197 bf63b8-bf63fd call bf4278 189->197 198 bf6536-bf654a 189->198 190->189 321 bf64bd-bf64df 197->321 203 bf668d-bf66a1 198->203 204 bf6550-bf656f 198->204 215 bf67ee-bf6802 203->215 216 bf66a7-bf67a7 203->216 237 bf6614-bf6636 204->237 223 bf694f-bf6963 215->223 224 bf6808-bf6908 215->224 216->215 241 bf6969-bf6a69 223->241 242 bf6ab0-bf6ada 223->242 224->223 250 bf663c 237->250 251 bf6574-bf6583 237->251 241->242 261 bf6b9a-bf6bae 242->261 262 bf6ae0-bf6b53 242->262 250->203 266 bf663e 251->266 267 bf6589-bf65bc 251->267 278 bf6c8b-bf6c9f 261->278 279 bf6bb4-bf6c0b 261->279 262->261 285 bf6643-bf668b 266->285 358 bf65be-bf65f8 267->358 359 bf6603-bf660c 267->359 283 bf6de5-bf6df9 278->283 284 bf6ca5-bf6d9e 278->284 397 bf6c12-bf6c44 279->397 298 bf6dff-bf6e4f 283->298 299 bf705c-bf7070 283->299 284->283 285->203 289->59 418 bf6ebd-bf6ee8 298->418 419 bf6e51-bf6e77 298->419 308 bf7158-bf715f 299->308 309 bf7076-bf7111 call bf4278 * 2 299->309 309->308 333 bf64e5 321->333 334 bf6402-bf6411 321->334 333->198 355 bf64e7 334->355 356 bf6417-bf64b5 334->356 382 bf64ec-bf6534 355->382 356->382 488 bf64b7 356->488 358->359 359->285 363 bf660e 359->363 363->237 382->198 397->278 491 bf6eee-bf6fc1 418->491 492 bf6fc6-bf7057 418->492 494 bf6e79-bf6e99 419->494 495 bf6eb8 419->495 488->321 500 bf536d 489->500 490->500 491->299 492->299 494->495 495->299 500->108 548->73 556->98 557->98 558->98 559->98
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.4103023942.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_bf0000_server.jbxd
              Similarity
              • API ID:
              • String ID: @
              • API String ID: 0-2766056989
              • Opcode ID: 0df31e6e551ea35b651c531426adf3ecf52630b9b1ceb6091c7b687a025b6592
              • Instruction ID: 3f7a053757f4b3141176e3fdff4776eda97838b3e46aefbb0c197e0da1fe76a3
              • Opcode Fuzzy Hash: 0df31e6e551ea35b651c531426adf3ecf52630b9b1ceb6091c7b687a025b6592
              • Instruction Fuzzy Hash: 5A234A74A01228CFDB25EF34D9A4BA9B7B2FB49304F1041E9D60967398DB399E85CF50
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1123 bf44f1-bf467d 1144 bf480d-bf4821 1123->1144 1145 bf4683-bf47d2 1123->1145 1146 bf496f-bf4983 1144->1146 1147 bf4827-bf4934 1144->1147 1145->1144 1149 bf49d6-bf49ea 1146->1149 1150 bf4985-bf498b call bf4210 1146->1150 1147->1146 1152 bf49ec-bf49f7 1149->1152 1153 bf4a32-bf4a46 1149->1153 1158 bf4990-bf499b 1150->1158 1152->1153 1155 bf4a4c-bf4b51 1153->1155 1156 bf4b94-bf4ba8 1153->1156 1380 bf4b59 1155->1380 1160 bf4bae-bf4bc2 1156->1160 1161 bf4cd4-bf4ce8 1156->1161 1158->1149 1164 bf4bc4-bf4bcb 1160->1164 1165 bf4bd0-bf4be4 1160->1165 1168 bf4cee-bf4f22 1161->1168 1169 bf4f74-bf4f88 1161->1169 1173 bf4c48-bf4c5c 1164->1173 1170 bf4bef-bf4c03 1165->1170 1171 bf4be6-bf4bed 1165->1171 1639 bf4f2d 1168->1639 1174 bf4f8a-bf4f91 1169->1174 1175 bf4fe2-bf4ff6 1169->1175 1176 bf4c0e-bf4c22 1170->1176 1177 bf4c05-bf4c0c 1170->1177 1171->1173 1180 bf4c5e-bf4c74 1173->1180 1181 bf4c76-bf4c82 1173->1181 1200 bf4f9b 1174->1200 1178 bf4ff8 1175->1178 1179 bf5045-bf5059 1175->1179 1185 bf4c2d-bf4c41 1176->1185 1186 bf4c24-bf4c2b 1176->1186 1177->1173 1647 bf4ff8 call c005e1 1178->1647 1648 bf4ff8 call c00606 1178->1648 1649 bf4ff8 call bf7461 1178->1649 1650 bf4ff8 call bf7310 1178->1650 1187 bf505b 1179->1187 1188 bf50a2-bf50b6 1179->1188 1190 bf4c8d 1180->1190 1181->1190 1185->1173 1196 bf4c43-bf4c45 1185->1196 1186->1173 1187->1188 1194 bf512d-bf5141 1188->1194 1195 bf50b8-bf50e1 1188->1195 1190->1161 1193 bf4ffe 1193->1179 1201 bf5147-bf5363 1194->1201 1202 bf53b4-bf53c8 1194->1202 1195->1194 1196->1173 1200->1175 1580 bf5367 1201->1580 1581 bf5365 1201->1581 1207 bf549e-bf54b2 1202->1207 1208 bf53ce-bf5457 1202->1208 1212 bf566f-bf5683 1207->1212 1213 bf54b8-bf5628 1207->1213 1208->1207 1218 bf5689-bf579f 1212->1218 1219 bf57e6-bf57fa 1212->1219 1213->1212 1218->1219 1225 bf595d-bf5971 1219->1225 1226 bf5800-bf5916 1219->1226 1229 bf5977-bf5a8d 1225->1229 1230 bf5ad4-bf5ae8 1225->1230 1226->1225 1229->1230 1237 bf5aee-bf5c04 1230->1237 1238 bf5c4b-bf5c5f 1230->1238 1237->1238 1242 bf5c65-bf5d7b 1238->1242 1243 bf5dc2-bf5dd6 1238->1243 1242->1243 1249 bf5ddc-bf5ef2 1243->1249 1250 bf5f39-bf5f4d 1243->1250 1249->1250 1256 bf5f53-bf6069 1250->1256 1257 bf60b0-bf60c4 1250->1257 1256->1257 1271 bf60ca-bf61e0 1257->1271 1272 bf6227-bf623b 1257->1272 1271->1272 1280 bf639e-bf63b2 1272->1280 1281 bf6241-bf6357 1272->1281 1288 bf63b8-bf63fd call bf4278 1280->1288 1289 bf6536-bf654a 1280->1289 1281->1280 1412 bf64bd-bf64df 1288->1412 1294 bf668d-bf66a1 1289->1294 1295 bf6550-bf656f 1289->1295 1306 bf67ee-bf6802 1294->1306 1307 bf66a7-bf67a7 1294->1307 1328 bf6614-bf6636 1295->1328 1314 bf694f-bf6963 1306->1314 1315 bf6808-bf6908 1306->1315 1307->1306 1332 bf6969-bf6a69 1314->1332 1333 bf6ab0-bf6ada 1314->1333 1315->1314 1341 bf663c 1328->1341 1342 bf6574-bf6583 1328->1342 1332->1333 1352 bf6b9a-bf6bae 1333->1352 1353 bf6ae0-bf6b53 1333->1353 1341->1294 1357 bf663e 1342->1357 1358 bf6589-bf65bc 1342->1358 1369 bf6c8b-bf6c9f 1352->1369 1370 bf6bb4-bf6c0b 1352->1370 1353->1352 1376 bf6643-bf668b 1357->1376 1449 bf65be-bf65f8 1358->1449 1450 bf6603-bf660c 1358->1450 1374 bf6de5-bf6df9 1369->1374 1375 bf6ca5-bf6d9e 1369->1375 1488 bf6c12-bf6c44 1370->1488 1389 bf6dff-bf6e4f 1374->1389 1390 bf705c-bf7070 1374->1390 1375->1374 1376->1294 1380->1156 1509 bf6ebd-bf6ee8 1389->1509 1510 bf6e51-bf6e77 1389->1510 1399 bf7158-bf715f 1390->1399 1400 bf7076-bf7111 call bf4278 * 2 1390->1400 1400->1399 1424 bf64e5 1412->1424 1425 bf6402-bf6411 1412->1425 1424->1289 1446 bf64e7 1425->1446 1447 bf6417-bf64b5 1425->1447 1473 bf64ec-bf6534 1446->1473 1447->1473 1579 bf64b7 1447->1579 1449->1450 1450->1376 1454 bf660e 1450->1454 1454->1328 1473->1289 1488->1369 1582 bf6eee-bf6fc1 1509->1582 1583 bf6fc6-bf7057 1509->1583 1585 bf6e79-bf6e99 1510->1585 1586 bf6eb8 1510->1586 1579->1412 1591 bf536d 1580->1591 1581->1591 1582->1390 1583->1390 1585->1586 1586->1390 1591->1202 1639->1169 1647->1193 1648->1193 1649->1193 1650->1193
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.4103023942.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_bf0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID: 0-3916222277
              • Opcode ID: 5f244475f901af14db7c247b2e93bf93daecb051186c839c04365e7443cedd8d
              • Instruction ID: f4673f2dd16d987d8ef3e8982c727f7c0ddcf89e2d858242b13fba117f276774
              • Opcode Fuzzy Hash: 5f244475f901af14db7c247b2e93bf93daecb051186c839c04365e7443cedd8d
              • Instruction Fuzzy Hash: FA035E74A01228CFDB25EF34D994BA9B7B2FB49304F1041E9D60967398CB399E85CF50
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 2176 bf4630-bf467d 2183 bf480d-bf4821 2176->2183 2184 bf4683-bf47d2 2176->2184 2185 bf496f-bf4983 2183->2185 2186 bf4827-bf4934 2183->2186 2184->2183 2188 bf49d6-bf49ea 2185->2188 2189 bf4985-bf498b call bf4210 2185->2189 2186->2185 2191 bf49ec-bf49f7 2188->2191 2192 bf4a32-bf4a46 2188->2192 2197 bf4990-bf499b 2189->2197 2191->2192 2194 bf4a4c-bf4b51 2192->2194 2195 bf4b94-bf4ba8 2192->2195 2419 bf4b59 2194->2419 2199 bf4bae-bf4bc2 2195->2199 2200 bf4cd4-bf4ce8 2195->2200 2197->2188 2203 bf4bc4-bf4bcb 2199->2203 2204 bf4bd0-bf4be4 2199->2204 2207 bf4cee-bf4f22 2200->2207 2208 bf4f74-bf4f88 2200->2208 2212 bf4c48-bf4c5c 2203->2212 2209 bf4bef-bf4c03 2204->2209 2210 bf4be6-bf4bed 2204->2210 2678 bf4f2d 2207->2678 2213 bf4f8a-bf4f91 2208->2213 2214 bf4fe2-bf4ff6 2208->2214 2215 bf4c0e-bf4c22 2209->2215 2216 bf4c05-bf4c0c 2209->2216 2210->2212 2219 bf4c5e-bf4c74 2212->2219 2220 bf4c76-bf4c82 2212->2220 2239 bf4f9b 2213->2239 2217 bf4ff8 2214->2217 2218 bf5045-bf5059 2214->2218 2224 bf4c2d-bf4c41 2215->2224 2225 bf4c24-bf4c2b 2215->2225 2216->2212 2686 bf4ff8 call c005e1 2217->2686 2687 bf4ff8 call c00606 2217->2687 2688 bf4ff8 call bf7461 2217->2688 2689 bf4ff8 call bf7310 2217->2689 2226 bf505b 2218->2226 2227 bf50a2-bf50b6 2218->2227 2229 bf4c8d 2219->2229 2220->2229 2224->2212 2235 bf4c43-bf4c45 2224->2235 2225->2212 2226->2227 2233 bf512d-bf5141 2227->2233 2234 bf50b8-bf50e1 2227->2234 2229->2200 2232 bf4ffe 2232->2218 2240 bf5147-bf5363 2233->2240 2241 bf53b4-bf53c8 2233->2241 2234->2233 2235->2212 2239->2214 2619 bf5367 2240->2619 2620 bf5365 2240->2620 2246 bf549e-bf54b2 2241->2246 2247 bf53ce-bf5457 2241->2247 2251 bf566f-bf5683 2246->2251 2252 bf54b8-bf5628 2246->2252 2247->2246 2257 bf5689-bf579f 2251->2257 2258 bf57e6-bf57fa 2251->2258 2252->2251 2257->2258 2264 bf595d-bf5971 2258->2264 2265 bf5800-bf5916 2258->2265 2268 bf5977-bf5a8d 2264->2268 2269 bf5ad4-bf5ae8 2264->2269 2265->2264 2268->2269 2276 bf5aee-bf5c04 2269->2276 2277 bf5c4b-bf5c5f 2269->2277 2276->2277 2281 bf5c65-bf5d7b 2277->2281 2282 bf5dc2-bf5dd6 2277->2282 2281->2282 2288 bf5ddc-bf5ef2 2282->2288 2289 bf5f39-bf5f4d 2282->2289 2288->2289 2295 bf5f53-bf6069 2289->2295 2296 bf60b0-bf60c4 2289->2296 2295->2296 2310 bf60ca-bf61e0 2296->2310 2311 bf6227-bf623b 2296->2311 2310->2311 2319 bf639e-bf63b2 2311->2319 2320 bf6241-bf6357 2311->2320 2327 bf63b8-bf63fd call bf4278 2319->2327 2328 bf6536-bf654a 2319->2328 2320->2319 2451 bf64bd-bf64df 2327->2451 2333 bf668d-bf66a1 2328->2333 2334 bf6550-bf656f 2328->2334 2345 bf67ee-bf6802 2333->2345 2346 bf66a7-bf67a7 2333->2346 2367 bf6614-bf6636 2334->2367 2353 bf694f-bf6963 2345->2353 2354 bf6808-bf6908 2345->2354 2346->2345 2371 bf6969-bf6a69 2353->2371 2372 bf6ab0-bf6ada 2353->2372 2354->2353 2380 bf663c 2367->2380 2381 bf6574-bf6583 2367->2381 2371->2372 2391 bf6b9a-bf6bae 2372->2391 2392 bf6ae0-bf6b53 2372->2392 2380->2333 2396 bf663e 2381->2396 2397 bf6589-bf65bc 2381->2397 2408 bf6c8b-bf6c9f 2391->2408 2409 bf6bb4-bf6c0b 2391->2409 2392->2391 2415 bf6643-bf668b 2396->2415 2488 bf65be-bf65f8 2397->2488 2489 bf6603-bf660c 2397->2489 2413 bf6de5-bf6df9 2408->2413 2414 bf6ca5-bf6d9e 2408->2414 2527 bf6c12-bf6c44 2409->2527 2428 bf6dff-bf6e4f 2413->2428 2429 bf705c-bf7070 2413->2429 2414->2413 2415->2333 2419->2195 2548 bf6ebd-bf6ee8 2428->2548 2549 bf6e51-bf6e77 2428->2549 2438 bf7158-bf715f 2429->2438 2439 bf7076-bf7111 call bf4278 * 2 2429->2439 2439->2438 2463 bf64e5 2451->2463 2464 bf6402-bf6411 2451->2464 2463->2328 2485 bf64e7 2464->2485 2486 bf6417-bf64b5 2464->2486 2512 bf64ec-bf6534 2485->2512 2486->2512 2618 bf64b7 2486->2618 2488->2489 2489->2415 2493 bf660e 2489->2493 2493->2367 2512->2328 2527->2408 2621 bf6eee-bf6fc1 2548->2621 2622 bf6fc6-bf7057 2548->2622 2624 bf6e79-bf6e99 2549->2624 2625 bf6eb8 2549->2625 2618->2451 2630 bf536d 2619->2630 2620->2630 2621->2429 2622->2429 2624->2625 2625->2429 2630->2241 2678->2208 2686->2232 2687->2232 2688->2232 2689->2232
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.4103023942.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_bf0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID: 0-3916222277
              • Opcode ID: 743d6ff0d53f05ac08d945627fabd66ac1efc8588301b7cd86b5631192c042a9
              • Instruction ID: 0f4d90cbc9f869657e0467f5130f3100501acbbcf7658576bd206487174358a3
              • Opcode Fuzzy Hash: 743d6ff0d53f05ac08d945627fabd66ac1efc8588301b7cd86b5631192c042a9
              • Instruction Fuzzy Hash: 07035D74A01228CFDB25EF34D9A4BA9B7B2FB49304F1041E9D90967398CB399E85CF50
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 2690 bf470f-bf4821 2704 bf496f-bf4983 2690->2704 2705 bf4827-bf4934 2690->2705 2706 bf49d6-bf49ea 2704->2706 2707 bf4985-bf498b call bf4210 2704->2707 2705->2704 2709 bf49ec-bf49f7 2706->2709 2710 bf4a32-bf4a46 2706->2710 2714 bf4990-bf499b 2707->2714 2709->2710 2712 bf4a4c-bf4b51 2710->2712 2713 bf4b94-bf4ba8 2710->2713 2925 bf4b59 2712->2925 2716 bf4bae-bf4bc2 2713->2716 2717 bf4cd4-bf4ce8 2713->2717 2714->2706 2720 bf4bc4-bf4bcb 2716->2720 2721 bf4bd0-bf4be4 2716->2721 2723 bf4cee-bf4f22 2717->2723 2724 bf4f74-bf4f88 2717->2724 2728 bf4c48-bf4c5c 2720->2728 2725 bf4bef-bf4c03 2721->2725 2726 bf4be6-bf4bed 2721->2726 3184 bf4f2d 2723->3184 2729 bf4f8a-bf4f91 2724->2729 2730 bf4fe2-bf4ff6 2724->2730 2731 bf4c0e-bf4c22 2725->2731 2732 bf4c05-bf4c0c 2725->2732 2726->2728 2735 bf4c5e-bf4c74 2728->2735 2736 bf4c76-bf4c82 2728->2736 2753 bf4f9b 2729->2753 2733 bf4ff8 2730->2733 2734 bf5045-bf5059 2730->2734 2739 bf4c2d-bf4c41 2731->2739 2740 bf4c24-bf4c2b 2731->2740 2732->2728 3192 bf4ff8 call c005e1 2733->3192 3193 bf4ff8 call c00606 2733->3193 3194 bf4ff8 call bf7461 2733->3194 3195 bf4ff8 call bf7310 2733->3195 2741 bf505b 2734->2741 2742 bf50a2-bf50b6 2734->2742 2744 bf4c8d 2735->2744 2736->2744 2739->2728 2748 bf4c43-bf4c45 2739->2748 2740->2728 2741->2742 2750 bf512d-bf5141 2742->2750 2751 bf50b8-bf50e1 2742->2751 2744->2717 2747 bf4ffe 2747->2734 2748->2728 2754 bf5147-bf5363 2750->2754 2755 bf53b4-bf53c8 2750->2755 2751->2750 2753->2730 3125 bf5367 2754->3125 3126 bf5365 2754->3126 2758 bf549e-bf54b2 2755->2758 2759 bf53ce-bf5457 2755->2759 2763 bf566f-bf5683 2758->2763 2764 bf54b8-bf5628 2758->2764 2759->2758 2767 bf5689-bf579f 2763->2767 2768 bf57e6-bf57fa 2763->2768 2764->2763 2767->2768 2775 bf595d-bf5971 2768->2775 2776 bf5800-bf5916 2768->2776 2780 bf5977-bf5a8d 2775->2780 2781 bf5ad4-bf5ae8 2775->2781 2776->2775 2780->2781 2786 bf5aee-bf5c04 2781->2786 2787 bf5c4b-bf5c5f 2781->2787 2786->2787 2792 bf5c65-bf5d7b 2787->2792 2793 bf5dc2-bf5dd6 2787->2793 2792->2793 2799 bf5ddc-bf5ef2 2793->2799 2800 bf5f39-bf5f4d 2793->2800 2799->2800 2804 bf5f53-bf6069 2800->2804 2805 bf60b0-bf60c4 2800->2805 2804->2805 2818 bf60ca-bf61e0 2805->2818 2819 bf6227-bf623b 2805->2819 2818->2819 2827 bf639e-bf63b2 2819->2827 2828 bf6241-bf6357 2819->2828 2834 bf63b8-bf63fd call bf4278 2827->2834 2835 bf6536-bf654a 2827->2835 2828->2827 2957 bf64bd-bf64df 2834->2957 2840 bf668d-bf66a1 2835->2840 2841 bf6550-bf656f 2835->2841 2852 bf67ee-bf6802 2840->2852 2853 bf66a7-bf67a7 2840->2853 2873 bf6614-bf6636 2841->2873 2859 bf694f-bf6963 2852->2859 2860 bf6808-bf6908 2852->2860 2853->2852 2877 bf6969-bf6a69 2859->2877 2878 bf6ab0-bf6ada 2859->2878 2860->2859 2886 bf663c 2873->2886 2887 bf6574-bf6583 2873->2887 2877->2878 2897 bf6b9a-bf6bae 2878->2897 2898 bf6ae0-bf6b53 2878->2898 2886->2840 2902 bf663e 2887->2902 2903 bf6589-bf65bc 2887->2903 2914 bf6c8b-bf6c9f 2897->2914 2915 bf6bb4-bf6c0b 2897->2915 2898->2897 2921 bf6643-bf668b 2902->2921 2994 bf65be-bf65f8 2903->2994 2995 bf6603-bf660c 2903->2995 2919 bf6de5-bf6df9 2914->2919 2920 bf6ca5-bf6d9e 2914->2920 3033 bf6c12-bf6c44 2915->3033 2934 bf6dff-bf6e4f 2919->2934 2935 bf705c-bf7070 2919->2935 2920->2919 2921->2840 2925->2713 3054 bf6ebd-bf6ee8 2934->3054 3055 bf6e51-bf6e77 2934->3055 2944 bf7158-bf715f 2935->2944 2945 bf7076-bf7111 call bf4278 * 2 2935->2945 2945->2944 2969 bf64e5 2957->2969 2970 bf6402-bf6411 2957->2970 2969->2835 2991 bf64e7 2970->2991 2992 bf6417-bf64b5 2970->2992 3018 bf64ec-bf6534 2991->3018 2992->3018 3124 bf64b7 2992->3124 2994->2995 2995->2921 2999 bf660e 2995->2999 2999->2873 3018->2835 3033->2914 3127 bf6eee-bf6fc1 3054->3127 3128 bf6fc6-bf7057 3054->3128 3130 bf6e79-bf6e99 3055->3130 3131 bf6eb8 3055->3131 3124->2957 3136 bf536d 3125->3136 3126->3136 3127->2935 3128->2935 3130->3131 3131->2935 3136->2755 3184->2724 3192->2747 3193->2747 3194->2747 3195->2747
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.4103023942.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_bf0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID: 0-3916222277
              • Opcode ID: ed92fd3c2f96add6a6ac46e5522b5d3753ee58357cd2d9e4590ab45356c5e483
              • Instruction ID: 239a32688a7f107fac21464e299aade123efd9aca1bc7e80e83fd237a6aa2f44
              • Opcode Fuzzy Hash: ed92fd3c2f96add6a6ac46e5522b5d3753ee58357cd2d9e4590ab45356c5e483
              • Instruction Fuzzy Hash: D4F25D74A01228CFDB25EF34D9A4BA9B7B2FB49304F1041E9D60967398CB399E85DF50
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 3196 bf47d4-bf4821 3203 bf496f-bf4983 3196->3203 3204 bf4827-bf4934 3196->3204 3205 bf49d6-bf49ea 3203->3205 3206 bf4985-bf498b call bf4210 3203->3206 3204->3203 3208 bf49ec-bf49f7 3205->3208 3209 bf4a32-bf4a46 3205->3209 3213 bf4990-bf499b 3206->3213 3208->3209 3211 bf4a4c-bf4b51 3209->3211 3212 bf4b94-bf4ba8 3209->3212 3424 bf4b59 3211->3424 3215 bf4bae-bf4bc2 3212->3215 3216 bf4cd4-bf4ce8 3212->3216 3213->3205 3219 bf4bc4-bf4bcb 3215->3219 3220 bf4bd0-bf4be4 3215->3220 3222 bf4cee-bf4f22 3216->3222 3223 bf4f74-bf4f88 3216->3223 3227 bf4c48-bf4c5c 3219->3227 3224 bf4bef-bf4c03 3220->3224 3225 bf4be6-bf4bed 3220->3225 3683 bf4f2d 3222->3683 3228 bf4f8a-bf4f91 3223->3228 3229 bf4fe2-bf4ff6 3223->3229 3230 bf4c0e-bf4c22 3224->3230 3231 bf4c05-bf4c0c 3224->3231 3225->3227 3234 bf4c5e-bf4c74 3227->3234 3235 bf4c76-bf4c82 3227->3235 3252 bf4f9b 3228->3252 3232 bf4ff8 3229->3232 3233 bf5045-bf5059 3229->3233 3238 bf4c2d-bf4c41 3230->3238 3239 bf4c24-bf4c2b 3230->3239 3231->3227 3691 bf4ff8 call c005e1 3232->3691 3692 bf4ff8 call c00606 3232->3692 3693 bf4ff8 call bf7461 3232->3693 3694 bf4ff8 call bf7310 3232->3694 3240 bf505b 3233->3240 3241 bf50a2-bf50b6 3233->3241 3243 bf4c8d 3234->3243 3235->3243 3238->3227 3247 bf4c43-bf4c45 3238->3247 3239->3227 3240->3241 3249 bf512d-bf5141 3241->3249 3250 bf50b8-bf50e1 3241->3250 3243->3216 3246 bf4ffe 3246->3233 3247->3227 3253 bf5147-bf5363 3249->3253 3254 bf53b4-bf53c8 3249->3254 3250->3249 3252->3229 3624 bf5367 3253->3624 3625 bf5365 3253->3625 3257 bf549e-bf54b2 3254->3257 3258 bf53ce-bf5457 3254->3258 3262 bf566f-bf5683 3257->3262 3263 bf54b8-bf5628 3257->3263 3258->3257 3266 bf5689-bf579f 3262->3266 3267 bf57e6-bf57fa 3262->3267 3263->3262 3266->3267 3274 bf595d-bf5971 3267->3274 3275 bf5800-bf5916 3267->3275 3279 bf5977-bf5a8d 3274->3279 3280 bf5ad4-bf5ae8 3274->3280 3275->3274 3279->3280 3285 bf5aee-bf5c04 3280->3285 3286 bf5c4b-bf5c5f 3280->3286 3285->3286 3291 bf5c65-bf5d7b 3286->3291 3292 bf5dc2-bf5dd6 3286->3292 3291->3292 3298 bf5ddc-bf5ef2 3292->3298 3299 bf5f39-bf5f4d 3292->3299 3298->3299 3303 bf5f53-bf6069 3299->3303 3304 bf60b0-bf60c4 3299->3304 3303->3304 3317 bf60ca-bf61e0 3304->3317 3318 bf6227-bf623b 3304->3318 3317->3318 3326 bf639e-bf63b2 3318->3326 3327 bf6241-bf6357 3318->3327 3333 bf63b8-bf63fd call bf4278 3326->3333 3334 bf6536-bf654a 3326->3334 3327->3326 3456 bf64bd-bf64df 3333->3456 3339 bf668d-bf66a1 3334->3339 3340 bf6550-bf656f 3334->3340 3351 bf67ee-bf6802 3339->3351 3352 bf66a7-bf67a7 3339->3352 3372 bf6614-bf6636 3340->3372 3358 bf694f-bf6963 3351->3358 3359 bf6808-bf6908 3351->3359 3352->3351 3376 bf6969-bf6a69 3358->3376 3377 bf6ab0-bf6ada 3358->3377 3359->3358 3385 bf663c 3372->3385 3386 bf6574-bf6583 3372->3386 3376->3377 3396 bf6b9a-bf6bae 3377->3396 3397 bf6ae0-bf6b53 3377->3397 3385->3339 3401 bf663e 3386->3401 3402 bf6589-bf65bc 3386->3402 3413 bf6c8b-bf6c9f 3396->3413 3414 bf6bb4-bf6c0b 3396->3414 3397->3396 3420 bf6643-bf668b 3401->3420 3493 bf65be-bf65f8 3402->3493 3494 bf6603-bf660c 3402->3494 3418 bf6de5-bf6df9 3413->3418 3419 bf6ca5-bf6d9e 3413->3419 3532 bf6c12-bf6c44 3414->3532 3433 bf6dff-bf6e4f 3418->3433 3434 bf705c-bf7070 3418->3434 3419->3418 3420->3339 3424->3212 3553 bf6ebd-bf6ee8 3433->3553 3554 bf6e51-bf6e77 3433->3554 3443 bf7158-bf715f 3434->3443 3444 bf7076-bf7111 call bf4278 * 2 3434->3444 3444->3443 3468 bf64e5 3456->3468 3469 bf6402-bf6411 3456->3469 3468->3334 3490 bf64e7 3469->3490 3491 bf6417-bf64b5 3469->3491 3517 bf64ec-bf6534 3490->3517 3491->3517 3623 bf64b7 3491->3623 3493->3494 3494->3420 3498 bf660e 3494->3498 3498->3372 3517->3334 3532->3413 3626 bf6eee-bf6fc1 3553->3626 3627 bf6fc6-bf7057 3553->3627 3629 bf6e79-bf6e99 3554->3629 3630 bf6eb8 3554->3630 3623->3456 3635 bf536d 3624->3635 3625->3635 3626->3434 3627->3434 3629->3630 3630->3434 3635->3254 3683->3223 3691->3246 3692->3246 3693->3246 3694->3246
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.4103023942.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_bf0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID: 0-3916222277
              • Opcode ID: 64fed6230a9fb8a2dbd9242e484be6f752340b5e98000d18ee692e050016a528
              • Instruction ID: 7520fddf310687f051e63b75c7819a9d40f2cedeb425dd8c1629fa9f4b62daec
              • Opcode Fuzzy Hash: 64fed6230a9fb8a2dbd9242e484be6f752340b5e98000d18ee692e050016a528
              • Instruction Fuzzy Hash: 52F25C74A01128CFDB25EF34D9A4BA9B7B2FB49304F1041E9DA0967398CB395E85DF50
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 3695 bf4936-bf4983 3702 bf49d6-bf49ea 3695->3702 3703 bf4985-bf498b call bf4210 3695->3703 3704 bf49ec-bf49f7 3702->3704 3705 bf4a32-bf4a46 3702->3705 3709 bf4990-bf499b 3703->3709 3704->3705 3707 bf4a4c-bf4b51 3705->3707 3708 bf4b94-bf4ba8 3705->3708 3907 bf4b59 3707->3907 3710 bf4bae-bf4bc2 3708->3710 3711 bf4cd4-bf4ce8 3708->3711 3709->3702 3714 bf4bc4-bf4bcb 3710->3714 3715 bf4bd0-bf4be4 3710->3715 3717 bf4cee-bf4f22 3711->3717 3718 bf4f74-bf4f88 3711->3718 3721 bf4c48-bf4c5c 3714->3721 3719 bf4bef-bf4c03 3715->3719 3720 bf4be6-bf4bed 3715->3720 4166 bf4f2d 3717->4166 3722 bf4f8a-bf4f91 3718->3722 3723 bf4fe2-bf4ff6 3718->3723 3724 bf4c0e-bf4c22 3719->3724 3725 bf4c05-bf4c0c 3719->3725 3720->3721 3728 bf4c5e-bf4c74 3721->3728 3729 bf4c76-bf4c82 3721->3729 3745 bf4f9b 3722->3745 3726 bf4ff8 3723->3726 3727 bf5045-bf5059 3723->3727 3732 bf4c2d-bf4c41 3724->3732 3733 bf4c24-bf4c2b 3724->3733 3725->3721 4174 bf4ff8 call c005e1 3726->4174 4175 bf4ff8 call c00606 3726->4175 4176 bf4ff8 call bf7461 3726->4176 4177 bf4ff8 call bf7310 3726->4177 3734 bf505b 3727->3734 3735 bf50a2-bf50b6 3727->3735 3736 bf4c8d 3728->3736 3729->3736 3732->3721 3740 bf4c43-bf4c45 3732->3740 3733->3721 3734->3735 3742 bf512d-bf5141 3735->3742 3743 bf50b8-bf50e1 3735->3743 3736->3711 3739 bf4ffe 3739->3727 3740->3721 3746 bf5147-bf5363 3742->3746 3747 bf53b4-bf53c8 3742->3747 3743->3742 3745->3723 4107 bf5367 3746->4107 4108 bf5365 3746->4108 3749 bf549e-bf54b2 3747->3749 3750 bf53ce-bf5457 3747->3750 3754 bf566f-bf5683 3749->3754 3755 bf54b8-bf5628 3749->3755 3750->3749 3757 bf5689-bf579f 3754->3757 3758 bf57e6-bf57fa 3754->3758 3755->3754 3757->3758 3764 bf595d-bf5971 3758->3764 3765 bf5800-bf5916 3758->3765 3769 bf5977-bf5a8d 3764->3769 3770 bf5ad4-bf5ae8 3764->3770 3765->3764 3769->3770 3775 bf5aee-bf5c04 3770->3775 3776 bf5c4b-bf5c5f 3770->3776 3775->3776 3780 bf5c65-bf5d7b 3776->3780 3781 bf5dc2-bf5dd6 3776->3781 3780->3781 3786 bf5ddc-bf5ef2 3781->3786 3787 bf5f39-bf5f4d 3781->3787 3786->3787 3791 bf5f53-bf6069 3787->3791 3792 bf60b0-bf60c4 3787->3792 3791->3792 3804 bf60ca-bf61e0 3792->3804 3805 bf6227-bf623b 3792->3805 3804->3805 3813 bf639e-bf63b2 3805->3813 3814 bf6241-bf6357 3805->3814 3819 bf63b8-bf63fd call bf4278 3813->3819 3820 bf6536-bf654a 3813->3820 3814->3813 3939 bf64bd-bf64df 3819->3939 3825 bf668d-bf66a1 3820->3825 3826 bf6550-bf656f 3820->3826 3836 bf67ee-bf6802 3825->3836 3837 bf66a7-bf67a7 3825->3837 3856 bf6614-bf6636 3826->3856 3843 bf694f-bf6963 3836->3843 3844 bf6808-bf6908 3836->3844 3837->3836 3860 bf6969-bf6a69 3843->3860 3861 bf6ab0-bf6ada 3843->3861 3844->3843 3869 bf663c 3856->3869 3870 bf6574-bf6583 3856->3870 3860->3861 3879 bf6b9a-bf6bae 3861->3879 3880 bf6ae0-bf6b53 3861->3880 3869->3825 3884 bf663e 3870->3884 3885 bf6589-bf65bc 3870->3885 3896 bf6c8b-bf6c9f 3879->3896 3897 bf6bb4-bf6c0b 3879->3897 3880->3879 3903 bf6643-bf668b 3884->3903 3976 bf65be-bf65f8 3885->3976 3977 bf6603-bf660c 3885->3977 3901 bf6de5-bf6df9 3896->3901 3902 bf6ca5-bf6d9e 3896->3902 4015 bf6c12-bf6c44 3897->4015 3916 bf6dff-bf6e4f 3901->3916 3917 bf705c-bf7070 3901->3917 3902->3901 3903->3825 3907->3708 4036 bf6ebd-bf6ee8 3916->4036 4037 bf6e51-bf6e77 3916->4037 3926 bf7158-bf715f 3917->3926 3927 bf7076-bf7111 call bf4278 * 2 3917->3927 3927->3926 3951 bf64e5 3939->3951 3952 bf6402-bf6411 3939->3952 3951->3820 3973 bf64e7 3952->3973 3974 bf6417-bf64b5 3952->3974 4000 bf64ec-bf6534 3973->4000 3974->4000 4106 bf64b7 3974->4106 3976->3977 3977->3903 3981 bf660e 3977->3981 3981->3856 4000->3820 4015->3896 4109 bf6eee-bf6fc1 4036->4109 4110 bf6fc6-bf7057 4036->4110 4112 bf6e79-bf6e99 4037->4112 4113 bf6eb8 4037->4113 4106->3939 4118 bf536d 4107->4118 4108->4118 4109->3917 4110->3917 4112->4113 4113->3917 4118->3747 4166->3718 4174->3739 4175->3739 4176->3739 4177->3739
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.4103023942.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_bf0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID: 0-3916222277
              • Opcode ID: f21a114e998f765eceab2989255793ce3584b53aa3469928b28e6f8facf5fdcc
              • Instruction ID: 8629ee59ed864bfbd59ec3d952affa1888b41faf0142c8563810e47f4910d2e8
              • Opcode Fuzzy Hash: f21a114e998f765eceab2989255793ce3584b53aa3469928b28e6f8facf5fdcc
              • Instruction Fuzzy Hash: C1F25D74A01128CFDB25EF34D9A4BA9B7B2FB49304F1041E9DA0967398CB399E85DF50
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 4178 bf499d-bf49ea 4185 bf49ec-bf49f7 4178->4185 4186 bf4a32-bf4a46 4178->4186 4185->4186 4187 bf4a4c-bf4b51 4186->4187 4188 bf4b94-bf4ba8 4186->4188 4385 bf4b59 4187->4385 4189 bf4bae-bf4bc2 4188->4189 4190 bf4cd4-bf4ce8 4188->4190 4192 bf4bc4-bf4bcb 4189->4192 4193 bf4bd0-bf4be4 4189->4193 4195 bf4cee-bf4f22 4190->4195 4196 bf4f74-bf4f88 4190->4196 4199 bf4c48-bf4c5c 4192->4199 4197 bf4bef-bf4c03 4193->4197 4198 bf4be6-bf4bed 4193->4198 4644 bf4f2d 4195->4644 4200 bf4f8a-bf4f91 4196->4200 4201 bf4fe2-bf4ff6 4196->4201 4202 bf4c0e-bf4c22 4197->4202 4203 bf4c05-bf4c0c 4197->4203 4198->4199 4206 bf4c5e-bf4c74 4199->4206 4207 bf4c76-bf4c82 4199->4207 4223 bf4f9b 4200->4223 4204 bf4ff8 4201->4204 4205 bf5045-bf5059 4201->4205 4210 bf4c2d-bf4c41 4202->4210 4211 bf4c24-bf4c2b 4202->4211 4203->4199 4652 bf4ff8 call c005e1 4204->4652 4653 bf4ff8 call c00606 4204->4653 4654 bf4ff8 call bf7461 4204->4654 4655 bf4ff8 call bf7310 4204->4655 4212 bf505b 4205->4212 4213 bf50a2-bf50b6 4205->4213 4214 bf4c8d 4206->4214 4207->4214 4210->4199 4218 bf4c43-bf4c45 4210->4218 4211->4199 4212->4213 4220 bf512d-bf5141 4213->4220 4221 bf50b8-bf50e1 4213->4221 4214->4190 4217 bf4ffe 4217->4205 4218->4199 4224 bf5147-bf5363 4220->4224 4225 bf53b4-bf53c8 4220->4225 4221->4220 4223->4201 4585 bf5367 4224->4585 4586 bf5365 4224->4586 4227 bf549e-bf54b2 4225->4227 4228 bf53ce-bf5457 4225->4228 4232 bf566f-bf5683 4227->4232 4233 bf54b8-bf5628 4227->4233 4228->4227 4235 bf5689-bf579f 4232->4235 4236 bf57e6-bf57fa 4232->4236 4233->4232 4235->4236 4242 bf595d-bf5971 4236->4242 4243 bf5800-bf5916 4236->4243 4247 bf5977-bf5a8d 4242->4247 4248 bf5ad4-bf5ae8 4242->4248 4243->4242 4247->4248 4253 bf5aee-bf5c04 4248->4253 4254 bf5c4b-bf5c5f 4248->4254 4253->4254 4258 bf5c65-bf5d7b 4254->4258 4259 bf5dc2-bf5dd6 4254->4259 4258->4259 4264 bf5ddc-bf5ef2 4259->4264 4265 bf5f39-bf5f4d 4259->4265 4264->4265 4269 bf5f53-bf6069 4265->4269 4270 bf60b0-bf60c4 4265->4270 4269->4270 4282 bf60ca-bf61e0 4270->4282 4283 bf6227-bf623b 4270->4283 4282->4283 4291 bf639e-bf63b2 4283->4291 4292 bf6241-bf6357 4283->4292 4297 bf63b8-bf63fd call bf4278 4291->4297 4298 bf6536-bf654a 4291->4298 4292->4291 4417 bf64bd-bf64df 4297->4417 4303 bf668d-bf66a1 4298->4303 4304 bf6550-bf656f 4298->4304 4314 bf67ee-bf6802 4303->4314 4315 bf66a7-bf67a7 4303->4315 4334 bf6614-bf6636 4304->4334 4321 bf694f-bf6963 4314->4321 4322 bf6808-bf6908 4314->4322 4315->4314 4338 bf6969-bf6a69 4321->4338 4339 bf6ab0-bf6ada 4321->4339 4322->4321 4347 bf663c 4334->4347 4348 bf6574-bf6583 4334->4348 4338->4339 4357 bf6b9a-bf6bae 4339->4357 4358 bf6ae0-bf6b53 4339->4358 4347->4303 4362 bf663e 4348->4362 4363 bf6589-bf65bc 4348->4363 4374 bf6c8b-bf6c9f 4357->4374 4375 bf6bb4-bf6c0b 4357->4375 4358->4357 4381 bf6643-bf668b 4362->4381 4454 bf65be-bf65f8 4363->4454 4455 bf6603-bf660c 4363->4455 4379 bf6de5-bf6df9 4374->4379 4380 bf6ca5-bf6d9e 4374->4380 4493 bf6c12-bf6c44 4375->4493 4394 bf6dff-bf6e4f 4379->4394 4395 bf705c-bf7070 4379->4395 4380->4379 4381->4303 4385->4188 4514 bf6ebd-bf6ee8 4394->4514 4515 bf6e51-bf6e77 4394->4515 4404 bf7158-bf715f 4395->4404 4405 bf7076-bf7111 call bf4278 * 2 4395->4405 4405->4404 4429 bf64e5 4417->4429 4430 bf6402-bf6411 4417->4430 4429->4298 4451 bf64e7 4430->4451 4452 bf6417-bf64b5 4430->4452 4478 bf64ec-bf6534 4451->4478 4452->4478 4584 bf64b7 4452->4584 4454->4455 4455->4381 4459 bf660e 4455->4459 4459->4334 4478->4298 4493->4374 4587 bf6eee-bf6fc1 4514->4587 4588 bf6fc6-bf7057 4514->4588 4590 bf6e79-bf6e99 4515->4590 4591 bf6eb8 4515->4591 4584->4417 4596 bf536d 4585->4596 4586->4596 4587->4395 4588->4395 4590->4591 4591->4395 4596->4225 4644->4196 4652->4217 4653->4217 4654->4217 4655->4217
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.4103023942.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_bf0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID: 0-3916222277
              • Opcode ID: 713a3dedd61dba8162d660e8e33b2daa3b3a17d0376ed1418f3f8d65deb49e88
              • Instruction ID: 8ec5e8621c85fefe0ec0e0812f63f661091a7984394cf16fa0f630d7fb4cd8df
              • Opcode Fuzzy Hash: 713a3dedd61dba8162d660e8e33b2daa3b3a17d0376ed1418f3f8d65deb49e88
              • Instruction Fuzzy Hash: B3F25D74A01128CFDB25EF34D9A4BA9B7B2FB49304F1041E9DA0967398CB399E85DF50
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 4656 bf49f9-bf4a46 4663 bf4a4c-bf4b51 4656->4663 4664 bf4b94-bf4ba8 4656->4664 4860 bf4b59 4663->4860 4665 bf4bae-bf4bc2 4664->4665 4666 bf4cd4-bf4ce8 4664->4666 4667 bf4bc4-bf4bcb 4665->4667 4668 bf4bd0-bf4be4 4665->4668 4670 bf4cee-bf4f22 4666->4670 4671 bf4f74-bf4f88 4666->4671 4674 bf4c48-bf4c5c 4667->4674 4672 bf4bef-bf4c03 4668->4672 4673 bf4be6-bf4bed 4668->4673 5119 bf4f2d 4670->5119 4675 bf4f8a-bf4f91 4671->4675 4676 bf4fe2-bf4ff6 4671->4676 4677 bf4c0e-bf4c22 4672->4677 4678 bf4c05-bf4c0c 4672->4678 4673->4674 4681 bf4c5e-bf4c74 4674->4681 4682 bf4c76-bf4c82 4674->4682 4698 bf4f9b 4675->4698 4679 bf4ff8 4676->4679 4680 bf5045-bf5059 4676->4680 4685 bf4c2d-bf4c41 4677->4685 4686 bf4c24-bf4c2b 4677->4686 4678->4674 5127 bf4ff8 call c005e1 4679->5127 5128 bf4ff8 call c00606 4679->5128 5129 bf4ff8 call bf7461 4679->5129 5130 bf4ff8 call bf7310 4679->5130 4687 bf505b 4680->4687 4688 bf50a2-bf50b6 4680->4688 4689 bf4c8d 4681->4689 4682->4689 4685->4674 4693 bf4c43-bf4c45 4685->4693 4686->4674 4687->4688 4695 bf512d-bf5141 4688->4695 4696 bf50b8-bf50e1 4688->4696 4689->4666 4692 bf4ffe 4692->4680 4693->4674 4699 bf5147-bf5363 4695->4699 4700 bf53b4-bf53c8 4695->4700 4696->4695 4698->4676 5060 bf5367 4699->5060 5061 bf5365 4699->5061 4702 bf549e-bf54b2 4700->4702 4703 bf53ce-bf5457 4700->4703 4707 bf566f-bf5683 4702->4707 4708 bf54b8-bf5628 4702->4708 4703->4702 4710 bf5689-bf579f 4707->4710 4711 bf57e6-bf57fa 4707->4711 4708->4707 4710->4711 4717 bf595d-bf5971 4711->4717 4718 bf5800-bf5916 4711->4718 4722 bf5977-bf5a8d 4717->4722 4723 bf5ad4-bf5ae8 4717->4723 4718->4717 4722->4723 4728 bf5aee-bf5c04 4723->4728 4729 bf5c4b-bf5c5f 4723->4729 4728->4729 4733 bf5c65-bf5d7b 4729->4733 4734 bf5dc2-bf5dd6 4729->4734 4733->4734 4739 bf5ddc-bf5ef2 4734->4739 4740 bf5f39-bf5f4d 4734->4740 4739->4740 4744 bf5f53-bf6069 4740->4744 4745 bf60b0-bf60c4 4740->4745 4744->4745 4757 bf60ca-bf61e0 4745->4757 4758 bf6227-bf623b 4745->4758 4757->4758 4766 bf639e-bf63b2 4758->4766 4767 bf6241-bf6357 4758->4767 4772 bf63b8-bf63fd call bf4278 4766->4772 4773 bf6536-bf654a 4766->4773 4767->4766 4892 bf64bd-bf64df 4772->4892 4778 bf668d-bf66a1 4773->4778 4779 bf6550-bf656f 4773->4779 4789 bf67ee-bf6802 4778->4789 4790 bf66a7-bf67a7 4778->4790 4809 bf6614-bf6636 4779->4809 4796 bf694f-bf6963 4789->4796 4797 bf6808-bf6908 4789->4797 4790->4789 4813 bf6969-bf6a69 4796->4813 4814 bf6ab0-bf6ada 4796->4814 4797->4796 4822 bf663c 4809->4822 4823 bf6574-bf6583 4809->4823 4813->4814 4832 bf6b9a-bf6bae 4814->4832 4833 bf6ae0-bf6b53 4814->4833 4822->4778 4837 bf663e 4823->4837 4838 bf6589-bf65bc 4823->4838 4849 bf6c8b-bf6c9f 4832->4849 4850 bf6bb4-bf6c0b 4832->4850 4833->4832 4856 bf6643-bf668b 4837->4856 4929 bf65be-bf65f8 4838->4929 4930 bf6603-bf660c 4838->4930 4854 bf6de5-bf6df9 4849->4854 4855 bf6ca5-bf6d9e 4849->4855 4968 bf6c12-bf6c44 4850->4968 4869 bf6dff-bf6e4f 4854->4869 4870 bf705c-bf7070 4854->4870 4855->4854 4856->4778 4860->4664 4989 bf6ebd-bf6ee8 4869->4989 4990 bf6e51-bf6e77 4869->4990 4879 bf7158-bf715f 4870->4879 4880 bf7076-bf7111 call bf4278 * 2 4870->4880 4880->4879 4904 bf64e5 4892->4904 4905 bf6402-bf6411 4892->4905 4904->4773 4926 bf64e7 4905->4926 4927 bf6417-bf64b5 4905->4927 4953 bf64ec-bf6534 4926->4953 4927->4953 5059 bf64b7 4927->5059 4929->4930 4930->4856 4934 bf660e 4930->4934 4934->4809 4953->4773 4968->4849 5062 bf6eee-bf6fc1 4989->5062 5063 bf6fc6-bf7057 4989->5063 5065 bf6e79-bf6e99 4990->5065 5066 bf6eb8 4990->5066 5059->4892 5071 bf536d 5060->5071 5061->5071 5062->4870 5063->4870 5065->5066 5066->4870 5071->4700 5119->4671 5127->4692 5128->4692 5129->4692 5130->4692
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.4103023942.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_bf0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID: 0-3916222277
              • Opcode ID: dc1cbbf679402bee816adf498c3ba984b56f42ffc961ddab9849112c4b195bed
              • Instruction ID: 0a2783e9ec57b6709f1f3c40859aa0f0a33b622bb5efb01ce9a8635ee2f5957e
              • Opcode Fuzzy Hash: dc1cbbf679402bee816adf498c3ba984b56f42ffc961ddab9849112c4b195bed
              • Instruction Fuzzy Hash: B1F25D74A01228CFDB25EF34D9A4BA9B7B2FB49304F1041E9D90967398CB399E85DF50
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 04FA0133
              Memory Dump Source
              • Source File: 00000001.00000002.4109766561.0000000004FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_4fa0000_server.jbxd
              Similarity
              • API ID: AdjustPrivilegesToken
              • String ID:
              • API String ID: 2874748243-0
              • Opcode ID: 1ec9583a788b86c763bdd89f8cf1aed02729647af0731ba8bfa212d78e3abb8c
              • Instruction ID: 11d887fc483f8fec9f21fab64a5b753c4635a34afd94d09cba04a9953f96fbc7
              • Opcode Fuzzy Hash: 1ec9583a788b86c763bdd89f8cf1aed02729647af0731ba8bfa212d78e3abb8c
              • Instruction Fuzzy Hash: 1B21A1B5509780AFDB228F25DC44B92BFF4EF06310F0884DAE9858F563D275A918DB62
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 04FA0133
              Memory Dump Source
              • Source File: 00000001.00000002.4109766561.0000000004FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_4fa0000_server.jbxd
              Similarity
              • API ID: AdjustPrivilegesToken
              • String ID:
              • API String ID: 2874748243-0
              • Opcode ID: f69e81fe8b5d370bbf5e388f9b332e39eaa1941920932c1e00d450762887fb23
              • Instruction ID: f0266d2e05635f0e6c0c853a36248998b549fd7355348ab8d95557479a43de10
              • Opcode Fuzzy Hash: f69e81fe8b5d370bbf5e388f9b332e39eaa1941920932c1e00d450762887fb23
              • Instruction Fuzzy Hash: 9911A0B2A003009FDB20CF15E944BA6FBE4EF08220F08C86AED458B662D775E418DF61
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000001.00000002.4103023942.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_bf0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 7745e94cf9e3ba5afc92e5e89be72772c01f92a0a86946f840eb75c4a2072b16
              • Instruction ID: 4cceb658498c05cf79eb0ae5bc1fcc1b2134f9daf70776b1b504bcd909ca2410
              • Opcode Fuzzy Hash: 7745e94cf9e3ba5afc92e5e89be72772c01f92a0a86946f840eb75c4a2072b16
              • Instruction Fuzzy Hash: 08E25D74A01228CFDB25EF34D9A4BA9B7B2FB49304F1041E9DA0967398CB395E85DF50
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000001.00000002.4103023942.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_bf0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 1d1753bfa0330be0cfdc7045f5f1452bc3c168e977e5395f4100fb266a2bc029
              • Instruction ID: 5a385ccb4c93abf35c1076ebb1d99f545961d83e01b572d1968bb3c69a8440a7
              • Opcode Fuzzy Hash: 1d1753bfa0330be0cfdc7045f5f1452bc3c168e977e5395f4100fb266a2bc029
              • Instruction Fuzzy Hash: 65D25D74A01228CFDB25EF34D9A4BA9B7B1FB49304F1041E9D909673A8DB399E81DF50
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000001.00000002.4103023942.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_bf0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: dd6e2cb2bb877fe27df1ef24c8015e1609ea0981890a8ba51605c2d3b968407b
              • Instruction ID: 0a6a0767c3eaab24966acaa8feeb1c77f56d3308004c299cb502f8339e9c3371
              • Opcode Fuzzy Hash: dd6e2cb2bb877fe27df1ef24c8015e1609ea0981890a8ba51605c2d3b968407b
              • Instruction Fuzzy Hash: A4D24D74A01228CFDB25EF34D9A4BA9B7B1FB49304F1041E9D909673A8DB399E81DF50
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000001.00000002.4103023942.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_bf0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 4a1c79ba0a2972510d670a56ac35ac533d436777939d293e6db50870c1c16817
              • Instruction ID: aaa8ca95cac0158a91fc38d21fd6505bf663fa82ac15d88e8d3abbc46c63b7af
              • Opcode Fuzzy Hash: 4a1c79ba0a2972510d670a56ac35ac533d436777939d293e6db50870c1c16817
              • Instruction Fuzzy Hash: 5DD24D74A01228CFDB25EF34D9A4BA9B7B2FB49304F1041E9D90967398DB399E81DF50
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000001.00000002.4103023942.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_bf0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b79b0a88296d3fe9ac35e5e4648785f0886263cdd45ba6e95ebc906b47257357
              • Instruction ID: 79dc53d03c63da86a57b67c4c57e4bb14c68f5431299d7162cf96e99577244f1
              • Opcode Fuzzy Hash: b79b0a88296d3fe9ac35e5e4648785f0886263cdd45ba6e95ebc906b47257357
              • Instruction Fuzzy Hash: B6D25C74A01228CFDB25EF34D9A4BA9B7B2FB49304F1041E9D90967398DB399E81DF50
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 5590 4fa2816-4fa28ce 5594 4fa28d3-4fa28df 5590->5594 5595 4fa28d0 5590->5595 5596 4fa28e1 5594->5596 5597 4fa28e4-4fa28ed 5594->5597 5595->5594 5596->5597 5598 4fa28ef 5597->5598 5599 4fa28f2-4fa2909 5597->5599 5598->5599 5601 4fa294b-4fa2950 5599->5601 5602 4fa290b-4fa291e RegCreateKeyExW 5599->5602 5601->5602 5603 4fa2952-4fa2957 5602->5603 5604 4fa2920-4fa2948 5602->5604 5603->5604
              APIs
              • RegCreateKeyExW.KERNELBASE(?,00000E24), ref: 04FA2911
              Memory Dump Source
              • Source File: 00000001.00000002.4109766561.0000000004FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_4fa0000_server.jbxd
              Similarity
              • API ID: Create
              • String ID:
              • API String ID: 2289755597-0
              • Opcode ID: a2c190aa7a85f62ce18978eef7e41d63a5f0badce0bbe2ca1d366006111f8637
              • Instruction ID: 7bd9380b469b7ab0d51f9646c9babaa2cc09583464bfcf41540de41bcd61553b
              • Opcode Fuzzy Hash: a2c190aa7a85f62ce18978eef7e41d63a5f0badce0bbe2ca1d366006111f8637
              • Instruction Fuzzy Hash: C0418FB15093806FE7238B259C50FA2BFF8EF06614F0945DBE984CB663D264E819CB71
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 5627 4fa0e77-4fa0e97 5628 4fa0eb9-4fa0eeb 5627->5628 5629 4fa0e99-4fa0eb8 5627->5629 5633 4fa0eee-4fa0f46 RegQueryValueExW 5628->5633 5629->5628 5635 4fa0f4c-4fa0f62 5633->5635
              APIs
              • RegQueryValueExW.KERNELBASE(?,00000E24,?,?), ref: 04FA0F3E
              Memory Dump Source
              • Source File: 00000001.00000002.4109766561.0000000004FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_4fa0000_server.jbxd
              Similarity
              • API ID: QueryValue
              • String ID:
              • API String ID: 3660427363-0
              • Opcode ID: 1db1fe3b880d5fdc13be809484d1a139a6740cc0dc6b4b6203156a0cfcafdd2b
              • Instruction ID: 3d45c214959937c9baa06f38d5bd8bd6931bdd07d0f55100cfc052046f069efd
              • Opcode Fuzzy Hash: 1db1fe3b880d5fdc13be809484d1a139a6740cc0dc6b4b6203156a0cfcafdd2b
              • Instruction Fuzzy Hash: D2318D6510E3C06FD3138B258C61A61BFB4EF47610B0E45DBD8C48B6A3D2296919D7B2
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 5636 4fa1aa4-4fa1b63 5642 4fa1bb5-4fa1bba 5636->5642 5643 4fa1b65-4fa1b6d getaddrinfo 5636->5643 5642->5643 5645 4fa1b73-4fa1b85 5643->5645 5646 4fa1bbc-4fa1bc1 5645->5646 5647 4fa1b87-4fa1bb2 5645->5647 5646->5647
              APIs
              • getaddrinfo.WS2_32(?,00000E24), ref: 04FA1B6B
              Memory Dump Source
              • Source File: 00000001.00000002.4109766561.0000000004FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_4fa0000_server.jbxd
              Similarity
              • API ID: getaddrinfo
              • String ID:
              • API String ID: 300660673-0
              • Opcode ID: 39ac68d21e79d9c2faadea6c08c08311dc2e8e3ba41aa22cd944c99ca21ac614
              • Instruction ID: 6268a5db354e526c27499cd976f3477259516869b5189b3cec5e83d4fbf66ca7
              • Opcode Fuzzy Hash: 39ac68d21e79d9c2faadea6c08c08311dc2e8e3ba41aa22cd944c99ca21ac614
              • Instruction Fuzzy Hash: 9531B1B1504344AFEB21CF61CC84FA6FBACEF05314F04499AFA489B682D374A909CB71
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetProcessTimes.KERNELBASE(?,00000E24,0315147C,00000000,00000000,00000000,00000000), ref: 04FA1A39
              Memory Dump Source
              • Source File: 00000001.00000002.4109766561.0000000004FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_4fa0000_server.jbxd
              Similarity
              • API ID: ProcessTimes
              • String ID:
              • API String ID: 1995159646-0
              • Opcode ID: fc4d73de7309435f815b30a42236ab54bd9cacd807095f400fa767478b02daf2
              • Instruction ID: aaab6aef056216a043feb893647e85dc03fa37767d334282b7ba32e6a0f82f3d
              • Opcode Fuzzy Hash: fc4d73de7309435f815b30a42236ab54bd9cacd807095f400fa767478b02daf2
              • Instruction Fuzzy Hash: 9131E8B25043806FE7228F54DD45B96BFB8EF06310F09889BE9848B593D235A909C771
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32(?,00000E24), ref: 04FA1427
              Memory Dump Source
              • Source File: 00000001.00000002.4109766561.0000000004FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_4fa0000_server.jbxd
              Similarity
              • API ID: DescriptorSecurity$ConvertString
              • String ID:
              • API String ID: 3907675253-0
              • Opcode ID: 237aad3c74def835af91efbce320bb1665b559f630679102a3bf572cf3d86473
              • Instruction ID: 219aae888f5ebfc1fd5528af3bc6032af1cbfce3e42415aef62f049d186db94b
              • Opcode Fuzzy Hash: 237aad3c74def835af91efbce320bb1665b559f630679102a3bf572cf3d86473
              • Instruction Fuzzy Hash: F831C3B1504344AFE721CF64DC45FA7BBF8EF06210F0888AAE984DB652D374E919CB61
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • RegCreateKeyExW.KERNELBASE(?,00000E24), ref: 04FA2911
              Memory Dump Source
              • Source File: 00000001.00000002.4109766561.0000000004FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_4fa0000_server.jbxd
              Similarity
              • API ID: Create
              • String ID:
              • API String ID: 2289755597-0
              • Opcode ID: ca5f23d721d981381325b8fc79292b15be252ad7e6b57bb98d8f5572c5b90b57
              • Instruction ID: 45fe6af0c04af6669e4ba81a5a8f8aabfd81549ab529e11b9d67da2260d1d564
              • Opcode Fuzzy Hash: ca5f23d721d981381325b8fc79292b15be252ad7e6b57bb98d8f5572c5b90b57
              • Instruction Fuzzy Hash: AB218BB2600304AFEB21DF65DC44FA7BBECEF18610F04886AE94586A52E734F5199B61
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetProcessWorkingSetSize.KERNEL32(?,00000E24,0315147C,00000000,00000000,00000000,00000000), ref: 04FA2C4F
              Memory Dump Source
              • Source File: 00000001.00000002.4109766561.0000000004FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_4fa0000_server.jbxd
              Similarity
              • API ID: ProcessSizeWorking
              • String ID:
              • API String ID: 3584180929-0
              • Opcode ID: f406b28a7b226a5626cea73c4bb9586f9d0086d97607cd2ae744b377eec6eca9
              • Instruction ID: a2695641f010ca5981e9dcc80207260921c1adf8e5454081d35ce3e8c9d32cd1
              • Opcode Fuzzy Hash: f406b28a7b226a5626cea73c4bb9586f9d0086d97607cd2ae744b377eec6eca9
              • Instruction Fuzzy Hash: B721D7B55093806FD713CF24DC55B96BFB8DF46224F0984DBE9448F293D225A909C771
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetExitCodeProcess.KERNELBASE(?,00000E24,0315147C,00000000,00000000,00000000,00000000), ref: 04FA03B4
              Memory Dump Source
              • Source File: 00000001.00000002.4109766561.0000000004FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_4fa0000_server.jbxd
              Similarity
              • API ID: CodeExitProcess
              • String ID:
              • API String ID: 3861947596-0
              • Opcode ID: 1a5ce7032d443c3b285b10fdf315704a60055b0264395e21a1aaa0632d96cd01
              • Instruction ID: 21fdcde3fefcd439848f77df77e7fc1de98f0c3303a8e311b0dfda543aef8382
              • Opcode Fuzzy Hash: 1a5ce7032d443c3b285b10fdf315704a60055b0264395e21a1aaa0632d96cd01
              • Instruction Fuzzy Hash: F621E7B15093805FE7128F65DC45BA6BFB8EF46324F0884DBE944CF193D264A909C771
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • getaddrinfo.WS2_32(?,00000E24), ref: 04FA1B6B
              Memory Dump Source
              • Source File: 00000001.00000002.4109766561.0000000004FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_4fa0000_server.jbxd
              Similarity
              • API ID: getaddrinfo
              • String ID:
              • API String ID: 300660673-0
              • Opcode ID: 25f9358bef6763dd557762ea07e192249a060775c36173f85f64a6bf5aaf8305
              • Instruction ID: 8f85c3ab697a7e0f560d603f7233be48a03341eb341e55f6c6e714d77b4c2177
              • Opcode Fuzzy Hash: 25f9358bef6763dd557762ea07e192249a060775c36173f85f64a6bf5aaf8305
              • Instruction Fuzzy Hash: A521B1B1500204AEFB31DF61CD85FA6F7ACEF04714F04886AFA489A681E774A5198B71
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000001.00000002.4109766561.0000000004FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_4fa0000_server.jbxd
              Similarity
              • API ID: select
              • String ID:
              • API String ID: 1274211008-0
              • Opcode ID: 7ea8dabacb5605b268ccae6e26e3c36416d34c18ddd3ece02e818dbf8b961428
              • Instruction ID: c75f07151d127bdfd339e77c539462605d8fa399071a11eceeca5375bb4a1561
              • Opcode Fuzzy Hash: 7ea8dabacb5605b268ccae6e26e3c36416d34c18ddd3ece02e818dbf8b961428
              • Instruction Fuzzy Hash: 70216DB56083809FDB22CF25CC44B52BFF8EF06210F0984DAE984CB263D275A919DB61
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • WSASocketW.WS2_32(?,?,?,?,?), ref: 04FA0FF6
              Memory Dump Source
              • Source File: 00000001.00000002.4109766561.0000000004FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_4fa0000_server.jbxd
              Similarity
              • API ID: Socket
              • String ID:
              • API String ID: 38366605-0
              • Opcode ID: fa31c47e42abd10baf24547a1716b95bf04aed828f86691930e65fa820095989
              • Instruction ID: f1ae1113751ab5816bff56d82984c5ed6015aca2a9e33f9359dabb268d0a895c
              • Opcode Fuzzy Hash: fa31c47e42abd10baf24547a1716b95bf04aed828f86691930e65fa820095989
              • Instruction Fuzzy Hash: 0B21CEB1404380AFE722CF55DD45F96FFB8EF09220F0888AEE9858B652D375A418CB61
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000001.00000002.4109766561.0000000004FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_4fa0000_server.jbxd
              Similarity
              • API ID: FileView
              • String ID:
              • API String ID: 3314676101-0
              • Opcode ID: dfc8aa3034cd8c3751cb0f0661716f00b3a47b7fa5ac566148dfb0c746fe62b6
              • Instruction ID: b565a6ec6c12b21bde33569dd6f7bac5333d35d077608c178c437eb4b195ff50
              • Opcode Fuzzy Hash: dfc8aa3034cd8c3751cb0f0661716f00b3a47b7fa5ac566148dfb0c746fe62b6
              • Instruction Fuzzy Hash: 3721A0B1404340AFE722CF15DD45F96FBF8EF09224F08889AE9848B652D375B908CB61
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32(?,00000E24), ref: 04FA1427
              Memory Dump Source
              • Source File: 00000001.00000002.4109766561.0000000004FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_4fa0000_server.jbxd
              Similarity
              • API ID: DescriptorSecurity$ConvertString
              • String ID:
              • API String ID: 3907675253-0
              • Opcode ID: d3ea4525107966958679da93049a11d27e2779f60162ab67c9d70d57ea9ccef9
              • Instruction ID: b2b1dc5ff5c851e6896e2ce9cd05a2a934a8eb5deeabfc77eb83d0682d1a8e00
              • Opcode Fuzzy Hash: d3ea4525107966958679da93049a11d27e2779f60162ab67c9d70d57ea9ccef9
              • Instruction Fuzzy Hash: B521D4B2600204AFEB20DF69DD45FABBBECEF05614F04886AED44DB642D374E5198B71
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • RegQueryValueExW.KERNELBASE(?,00000E24,0315147C,00000000,00000000,00000000,00000000), ref: 04FA133C
              Memory Dump Source
              • Source File: 00000001.00000002.4109766561.0000000004FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_4fa0000_server.jbxd
              Similarity
              • API ID: QueryValue
              • String ID:
              • API String ID: 3660427363-0
              • Opcode ID: 62e5917e43eb168c58782f84e8ba1e12494023a59113451511c538213fcc06e9
              • Instruction ID: f7509965fdfc2c85758f7862c00d8dfa12ace802b441a7b2d69e6dcf9f735186
              • Opcode Fuzzy Hash: 62e5917e43eb168c58782f84e8ba1e12494023a59113451511c538213fcc06e9
              • Instruction Fuzzy Hash: C9218DB1504740AFE722CF15DD44F57BBF8EF45610F09849AE9858B692D324A909CB61
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • SetProcessWorkingSetSize.KERNEL32(?,00000E24,0315147C,00000000,00000000,00000000,00000000), ref: 04FA2D33
              Memory Dump Source
              • Source File: 00000001.00000002.4109766561.0000000004FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_4fa0000_server.jbxd
              Similarity
              • API ID: ProcessSizeWorking
              • String ID:
              • API String ID: 3584180929-0
              • Opcode ID: 57e32d491db50dd818e771ead950596e28613caefa9fbee26287335e19bd2a2d
              • Instruction ID: 9427a600b68d518eee5125f61828b46e1800f958bbed4aa39bc53ff32ded57c2
              • Opcode Fuzzy Hash: 57e32d491db50dd818e771ead950596e28613caefa9fbee26287335e19bd2a2d
              • Instruction Fuzzy Hash: CB2195B15053806FD722CF55DC45FA6BFB8EF45210F0888ABF944DB692D374A908CB65
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • shutdown.WS2_32(?,00000E24,0315147C,00000000,00000000,00000000,00000000), ref: 04FA1860
              Memory Dump Source
              • Source File: 00000001.00000002.4109766561.0000000004FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_4fa0000_server.jbxd
              Similarity
              • API ID: shutdown
              • String ID:
              • API String ID: 2510479042-0
              • Opcode ID: 4a7cf96d7ddc25cea6a923767f54090fca3fd79b03a3ace029a2fbd141634d57
              • Instruction ID: 57f2e669f89fccc7935a25cf59918370b101efcee089d74f438f38991d146bbd
              • Opcode Fuzzy Hash: 4a7cf96d7ddc25cea6a923767f54090fca3fd79b03a3ace029a2fbd141634d57
              • Instruction Fuzzy Hash: 4821C8B14093806FD722CB14DC44B56BFB8EF46210F0884DBE9449B252C378A508C761
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • ioctlsocket.WS2_32(?,00000E24,0315147C,00000000,00000000,00000000,00000000), ref: 04FA2A9F
              Memory Dump Source
              • Source File: 00000001.00000002.4109766561.0000000004FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_4fa0000_server.jbxd
              Similarity
              • API ID: ioctlsocket
              • String ID:
              • API String ID: 3577187118-0
              • Opcode ID: 1ee6b97d776d50c973bdc093000cbdacb267359a5c9839d8b8d3346cc7d85f98
              • Instruction ID: 2031bc3da8fe74b6555bc1e3fcbda8aa6de3e423cc753b91ebd263377f73dd03
              • Opcode Fuzzy Hash: 1ee6b97d776d50c973bdc093000cbdacb267359a5c9839d8b8d3346cc7d85f98
              • Instruction Fuzzy Hash: 8921A1B15093846FD722CF55DC84FA6BFB8EF45210F0888ABE9449B652D374A908C762
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • FindCloseChangeNotification.KERNELBASE(?), ref: 04FA01EC
              Memory Dump Source
              • Source File: 00000001.00000002.4109766561.0000000004FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_4fa0000_server.jbxd
              Similarity
              • API ID: ChangeCloseFindNotification
              • String ID:
              • API String ID: 2591292051-0
              • Opcode ID: 493f463fcf489e4f8ecdb21ac307da4218fdc49150ab208e191bc84da1ddf68a
              • Instruction ID: 20e7c68793f46f60610a0036abc2042e42977b7b36e66dd95aee85562b6f7dd5
              • Opcode Fuzzy Hash: 493f463fcf489e4f8ecdb21ac307da4218fdc49150ab208e191bc84da1ddf68a
              • Instruction Fuzzy Hash: 7B21A1B15093C05FDB128F25EC54B92BFB4AF07224F0984DAEC858F663D264A908CB61
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • WSASocketW.WS2_32(?,?,?,?,?), ref: 04FA0FF6
              Memory Dump Source
              • Source File: 00000001.00000002.4109766561.0000000004FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_4fa0000_server.jbxd
              Similarity
              • API ID: Socket
              • String ID:
              • API String ID: 38366605-0
              • Opcode ID: 081568fbb38fa2756cacdd0fabcf558c6afc578f0eb17c4cd9b11e16fecd823c
              • Instruction ID: 074018ed3fec0655a593c68ddef6a465bc8d99b715a27f30b40faa82927ed978
              • Opcode Fuzzy Hash: 081568fbb38fa2756cacdd0fabcf558c6afc578f0eb17c4cd9b11e16fecd823c
              • Instruction Fuzzy Hash: AA21D1B1500240AFEB31CF55DD45FA6FBE4EF08320F04886EEA458A652D375B419CB71
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • WSAConnect.WS2_32(?,?,?,?,?,?,?), ref: 04FA1CF2
              Memory Dump Source
              • Source File: 00000001.00000002.4109766561.0000000004FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_4fa0000_server.jbxd
              Similarity
              • API ID: Connect
              • String ID:
              • API String ID: 3144859779-0
              • Opcode ID: 44e0704ffcfffd637b4561b8bfeb06193503cfea4930198d54019595e4458fd5
              • Instruction ID: 52c524cc9fede9e8e05e487c6a762234ed5cbf877964ef94b0420ccd75448ac0
              • Opcode Fuzzy Hash: 44e0704ffcfffd637b4561b8bfeb06193503cfea4930198d54019595e4458fd5
              • Instruction Fuzzy Hash: E4219271508384AFDB228F51DD44B52FFF4EF0A310F09889AED858B563D375A819DB61
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000001.00000002.4109766561.0000000004FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_4fa0000_server.jbxd
              Similarity
              • API ID: FileView
              • String ID:
              • API String ID: 3314676101-0
              • Opcode ID: 4881186ff43664a7a3f676266770c63bd129fb4554ffeb10335c6bd5513b6bf8
              • Instruction ID: 418041edc1061fa3a4bf0f2920cedd60325e9ed1f7ea012874b0169c9f1be03c
              • Opcode Fuzzy Hash: 4881186ff43664a7a3f676266770c63bd129fb4554ffeb10335c6bd5513b6bf8
              • Instruction Fuzzy Hash: 0621C3B1500304AFE721CF5ADE45F96FBE8EF08224F04886AE9458B751D375F519CB61
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • LoadLibraryA.KERNELBASE(?,00000E24), ref: 04FA1FBB
              Memory Dump Source
              • Source File: 00000001.00000002.4109766561.0000000004FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_4fa0000_server.jbxd
              Similarity
              • API ID: LibraryLoad
              • String ID:
              • API String ID: 1029625771-0
              • Opcode ID: 1a6b9b557586df2dd1e7264ef64113565b8e50c0953c04e7aae32a3f8624a5a0
              • Instruction ID: d360bae77c765395f94adf68130ed02863e4a3d6abf44060053ca4286bd54704
              • Opcode Fuzzy Hash: 1a6b9b557586df2dd1e7264ef64113565b8e50c0953c04e7aae32a3f8624a5a0
              • Instruction Fuzzy Hash: DE11B4715043806FE721CB15DD85FA6FBB8DF46720F08849AFD449B692D374B948CB61
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • RegQueryValueExW.KERNELBASE(?,00000E24,0315147C,00000000,00000000,00000000,00000000), ref: 04FA133C
              Memory Dump Source
              • Source File: 00000001.00000002.4109766561.0000000004FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_4fa0000_server.jbxd
              Similarity
              • API ID: QueryValue
              • String ID:
              • API String ID: 3660427363-0
              • Opcode ID: 0828970613c173b5fd170f9fda823e433ed5180aecfdcd59d2116f1039039fab
              • Instruction ID: 2fb7b7e34ef0d3ae26b8e9303bc45e373d510f8d71c015adaf983369f3664d90
              • Opcode Fuzzy Hash: 0828970613c173b5fd170f9fda823e433ed5180aecfdcd59d2116f1039039fab
              • Instruction Fuzzy Hash: EC1160B6600700AFEB21CF15DE45FA6B7E8EF04610F04846AE9858AA52D774F519CB61
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetProcessTimes.KERNELBASE(?,00000E24,0315147C,00000000,00000000,00000000,00000000), ref: 04FA1A39
              Memory Dump Source
              • Source File: 00000001.00000002.4109766561.0000000004FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_4fa0000_server.jbxd
              Similarity
              • API ID: ProcessTimes
              • String ID:
              • API String ID: 1995159646-0
              • Opcode ID: 47acd38d8a6b6ff8c488987caa50b341aa466013d0b9eea2a9146ae3bce51590
              • Instruction ID: 28595b582c42b67b2634e2d8e642c5f6c3ea660d748a061653cf8598344a68b9
              • Opcode Fuzzy Hash: 47acd38d8a6b6ff8c488987caa50b341aa466013d0b9eea2a9146ae3bce51590
              • Instruction Fuzzy Hash: ED11D0B2600300AFEB218F55DD45BAABBA8EF04220F04886AED458A651D374B5198BB2
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetProcessWorkingSetSize.KERNEL32(?,00000E24,0315147C,00000000,00000000,00000000,00000000), ref: 04FA2C4F
              Memory Dump Source
              • Source File: 00000001.00000002.4109766561.0000000004FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_4fa0000_server.jbxd
              Similarity
              • API ID: ProcessSizeWorking
              • String ID:
              • API String ID: 3584180929-0
              • Opcode ID: 5cb742c66a1a78a3c971fa3095bb07dbef75a61a22bac0fd46492e4ba3a7be85
              • Instruction ID: b2c3f526d38003a8e3a88dc662137efedf3ff9f3ea19c220f54f716b9a2a6b8e
              • Opcode Fuzzy Hash: 5cb742c66a1a78a3c971fa3095bb07dbef75a61a22bac0fd46492e4ba3a7be85
              • Instruction Fuzzy Hash: F711C4B6600300AFEB21CF55DD45BA6BBA8EF44224F0488BAED45CB742D774A509CBB5
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • SetProcessWorkingSetSize.KERNEL32(?,00000E24,0315147C,00000000,00000000,00000000,00000000), ref: 04FA2D33
              Memory Dump Source
              • Source File: 00000001.00000002.4109766561.0000000004FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_4fa0000_server.jbxd
              Similarity
              • API ID: ProcessSizeWorking
              • String ID:
              • API String ID: 3584180929-0
              • Opcode ID: 5cb742c66a1a78a3c971fa3095bb07dbef75a61a22bac0fd46492e4ba3a7be85
              • Instruction ID: bb89fcec40e3c3a2119e145ae96c7d19b7f41e20e5b677b14ff3b3f54af95647
              • Opcode Fuzzy Hash: 5cb742c66a1a78a3c971fa3095bb07dbef75a61a22bac0fd46492e4ba3a7be85
              • Instruction Fuzzy Hash: F411C8B16003009FE721CF55DD45BA6B7A8DF04324F04887AED45DB792D774A5058B71
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetExitCodeProcess.KERNELBASE(?,00000E24,0315147C,00000000,00000000,00000000,00000000), ref: 04FA03B4
              Memory Dump Source
              • Source File: 00000001.00000002.4109766561.0000000004FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_4fa0000_server.jbxd
              Similarity
              • API ID: CodeExitProcess
              • String ID:
              • API String ID: 3861947596-0
              • Opcode ID: 9bff63c8aadc17b89ed9a1fc290ccd3b1735e0f77d2c56cc4b2b5e3ad1ee2a2f
              • Instruction ID: 10785eb67740502e2e909df3748d017b30db20289e9f953ac9fb5d535c7752d5
              • Opcode Fuzzy Hash: 9bff63c8aadc17b89ed9a1fc290ccd3b1735e0f77d2c56cc4b2b5e3ad1ee2a2f
              • Instruction Fuzzy Hash: D911E7B1600300AFEB21CF19DD45BAABBA8DF04624F04887AED44CB641D774A505CBB1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • ioctlsocket.WS2_32(?,00000E24,0315147C,00000000,00000000,00000000,00000000), ref: 04FA2A9F
              Memory Dump Source
              • Source File: 00000001.00000002.4109766561.0000000004FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_4fa0000_server.jbxd
              Similarity
              • API ID: ioctlsocket
              • String ID:
              • API String ID: 3577187118-0
              • Opcode ID: d5fa67bcd69cec0507fff807c2422f503f8e632bcae9c7a4a03848e8d6c12db5
              • Instruction ID: 6c289c05d621f41ab7a7befd2e55f09b856a5d015fa3882e96239b71979dbed5
              • Opcode Fuzzy Hash: d5fa67bcd69cec0507fff807c2422f503f8e632bcae9c7a4a03848e8d6c12db5
              • Instruction Fuzzy Hash: F711C4B2600200AFE731CF55DD44BA6BBA8DF04324F04C8A6ED458B641D374A5098BB2
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • shutdown.WS2_32(?,00000E24,0315147C,00000000,00000000,00000000,00000000), ref: 04FA1860
              Memory Dump Source
              • Source File: 00000001.00000002.4109766561.0000000004FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_4fa0000_server.jbxd
              Similarity
              • API ID: shutdown
              • String ID:
              • API String ID: 2510479042-0
              • Opcode ID: 2c6129d9570cfd0df3ba41b7e10d278ce72e0517a146ec931068d77068837c5a
              • Instruction ID: 23c63615914f54352de0ab1f3f3a34c4f6fc650f70f358c577cd36aa0a99656b
              • Opcode Fuzzy Hash: 2c6129d9570cfd0df3ba41b7e10d278ce72e0517a146ec931068d77068837c5a
              • Instruction Fuzzy Hash: D211C6B5500200AFEB21CF15DD85BA6BBA8DF44724F048866ED449B641D374A5098BB2
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • LoadLibraryA.KERNELBASE(?,00000E24), ref: 04FA1FBB
              Memory Dump Source
              • Source File: 00000001.00000002.4109766561.0000000004FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_4fa0000_server.jbxd
              Similarity
              • API ID: LibraryLoad
              • String ID:
              • API String ID: 1029625771-0
              • Opcode ID: 8d44190c21e724035a54460b6d19acbf5b3cd18e97ff02b8eaeeb65e5412f20b
              • Instruction ID: 9142a6d4db86836fe4aff41139f8cb8a79b2bc512688dabafbc019ec210352a8
              • Opcode Fuzzy Hash: 8d44190c21e724035a54460b6d19acbf5b3cd18e97ff02b8eaeeb65e5412f20b
              • Instruction Fuzzy Hash: 8411E5B1500340AFE730DB15DE41FA6F7A8DF44724F14846AFE045A781D3B8B509CB61
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000001.00000002.4109766561.0000000004FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_4fa0000_server.jbxd
              Similarity
              • API ID: select
              • String ID:
              • API String ID: 1274211008-0
              • Opcode ID: 48815bec48153c307bf3a9456acd20132e9059066874fab7b913cb851a5856ce
              • Instruction ID: 13856a3b9d8a669c6a8eefd77518aece057bdb41f4935b58a88c0a54a5f3aa6e
              • Opcode Fuzzy Hash: 48815bec48153c307bf3a9456acd20132e9059066874fab7b913cb851a5856ce
              • Instruction Fuzzy Hash: 08116DB56002009FDB20CF15C984B96FBE8EF08650F0884EADD49CB762D334E419CB61
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • WSAConnect.WS2_32(?,?,?,?,?,?,?), ref: 04FA1CF2
              Memory Dump Source
              • Source File: 00000001.00000002.4109766561.0000000004FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_4fa0000_server.jbxd
              Similarity
              • API ID: Connect
              • String ID:
              • API String ID: 3144859779-0
              • Opcode ID: 8a19b3d3798f8f8e50e18610860a0f75c31f20220262b3b59973c8824267c43d
              • Instruction ID: 4c7831b486d13c491aa621a674b80856cbc0f489c46c85b2a37bc0a9c7068aeb
              • Opcode Fuzzy Hash: 8a19b3d3798f8f8e50e18610860a0f75c31f20220262b3b59973c8824267c43d
              • Instruction Fuzzy Hash: E6117C766002049FDB20CF55DA44BA2FBF4EF08321F0888AAED858B662D375E419DB61
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • RegQueryValueExW.KERNELBASE(?,00000E24,?,?), ref: 04FA0F3E
              Memory Dump Source
              • Source File: 00000001.00000002.4109766561.0000000004FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_4fa0000_server.jbxd
              Similarity
              • API ID: QueryValue
              • String ID:
              • API String ID: 3660427363-0
              • Opcode ID: d4969067f5d63020a741f5d0a5706aacaa149764fd3d62c90829792c43fb49f0
              • Instruction ID: 38603ce5502ecdd3d3b03a6726c2b0938a7afa6d30e043e768aa09d32ebef08f
              • Opcode Fuzzy Hash: d4969067f5d63020a741f5d0a5706aacaa149764fd3d62c90829792c43fb49f0
              • Instruction Fuzzy Hash: FA01A271600205ABD210DF1ACD46B66FBE8FB88A20F14852AED089BB41D771F915CBE5
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • FindCloseChangeNotification.KERNELBASE(?), ref: 04FA01EC
              Memory Dump Source
              • Source File: 00000001.00000002.4109766561.0000000004FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_4fa0000_server.jbxd
              Similarity
              • API ID: ChangeCloseFindNotification
              • String ID:
              • API String ID: 2591292051-0
              • Opcode ID: b6e0b76789f31ea96720cd61dd7b92468ee858802918b5776d8d30051fb0ecee
              • Instruction ID: 6d78420017aa2f48fc594d1ac894f891be15cc7e47f28a6031a123acbc8fb771
              • Opcode Fuzzy Hash: b6e0b76789f31ea96720cd61dd7b92468ee858802918b5776d8d30051fb0ecee
              • Instruction Fuzzy Hash: E601D4B5A043408FDB10CF59E984766FBE4DF04225F08C4BADD498BA42D674E518CB62
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000001.00000002.4103023942.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_bf0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 48bfacfdeb33ebbcd6add50f9c09d71cfd9abc587daf1ac75707fd79367c4d0a
              • Instruction ID: 054993c09a874ecba128a6fa532d5caa0769f9ca7d0be5ead76987956633ad7c
              • Opcode Fuzzy Hash: 48bfacfdeb33ebbcd6add50f9c09d71cfd9abc587daf1ac75707fd79367c4d0a
              • Instruction Fuzzy Hash: 0992C034704165CFDF215B6AE810BBA7BE6EB89344F1084A7984693BD8CF349D59EF20
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000001.00000002.4103023942.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_bf0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: aed9d92e91be483f2f0bc537487497737137a58b88493471ec58931d9c05b60b
              • Instruction ID: a78ef6998593bff793272c3e9082e882cea62176ccbc9a3bda06467479af0588
              • Opcode Fuzzy Hash: aed9d92e91be483f2f0bc537487497737137a58b88493471ec58931d9c05b60b
              • Instruction Fuzzy Hash: A892D034704165CFDF215B2AE810BBA7BE6EB89344F1084A7984693BD8CF348D59EF20
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000001.00000002.4103023942.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_bf0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 51c531fd4ca7a2be6db9a053ca969bf2c4f6aafcb7166ec91473186a423ad762
              • Instruction ID: 931edba8d77557480983d5d241096da1798c7bde6f6fcd11eca4846840e7ac85
              • Opcode Fuzzy Hash: 51c531fd4ca7a2be6db9a053ca969bf2c4f6aafcb7166ec91473186a423ad762
              • Instruction Fuzzy Hash: DA92D034704165CFDF215B2AA810BBA7BE6EB89344F1084A7984693BD8CF348D59EF20
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000001.00000002.4103023942.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_bf0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f6dad99a8ea6475d878576e2d1a59963eb922f9b08662e4603e8e1dcc7c6e415
              • Instruction ID: 60f027ef2692f461d83a4d181b789b9cf34c39d1fc231918ac856f73bbeea6b6
              • Opcode Fuzzy Hash: f6dad99a8ea6475d878576e2d1a59963eb922f9b08662e4603e8e1dcc7c6e415
              • Instruction Fuzzy Hash: FEB21A74A01228CFDB25EF34D9A4BA9B7B2FB49304F1091E9D90967398DB359E81CF50
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000001.00000002.4103023942.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_bf0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e46cac52d46f3f54a835d2b631f1cf8323d1681e5c1b1d3e16ad11c8c5de323c
              • Instruction ID: 6cda44a953581ac6b80be89e06c4b3b932d0ebc912950c667c25ad5e407a7b5c
              • Opcode Fuzzy Hash: e46cac52d46f3f54a835d2b631f1cf8323d1681e5c1b1d3e16ad11c8c5de323c
              • Instruction Fuzzy Hash: 05A22974A01228CFDB25EF30D9A4BA9B7B2FB49304F1051E9D909673A8DB359E81CF50
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000001.00000002.4103023942.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_bf0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b0df92a328f7ebe5fb035d0cbb527acdbddda6ba21bbce8fea7ac10884052871
              • Instruction ID: 25b7559d6875e845551b596fc1737c41f1e6da679a27a678a95c146c3c19ed37
              • Opcode Fuzzy Hash: b0df92a328f7ebe5fb035d0cbb527acdbddda6ba21bbce8fea7ac10884052871
              • Instruction Fuzzy Hash: 2E922A74A01228CFDB25EF34D9A4BA9B7B2FB49304F1091E9D90967399DB359E81CF40
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000001.00000002.4103023942.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_bf0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 5f1e907b6feac858b16a7452a8ce0de6c14ae28ff6df4619924250455be70d3f
              • Instruction ID: 50813459e738170eb983d5f20c7068c1af035f07eb79e33143cee9549eb48d13
              • Opcode Fuzzy Hash: 5f1e907b6feac858b16a7452a8ce0de6c14ae28ff6df4619924250455be70d3f
              • Instruction Fuzzy Hash: EE921B74A01228CFDB25EF34D9A4BA9B7B2FB49304F1051E9D909A7399DB359E81CF40
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000001.00000002.4103023942.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_bf0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ffbb61685bad9ec3eddf5a9e18d7032efb8f2359ffa3de6a67ffd5631c1c8b7e
              • Instruction ID: fa6b7f1fb2509f2770523baf241f822a2dd7fb466482db5d363fb9f003ec6fdf
              • Opcode Fuzzy Hash: ffbb61685bad9ec3eddf5a9e18d7032efb8f2359ffa3de6a67ffd5631c1c8b7e
              • Instruction Fuzzy Hash: BC821A74A01228CFDB25EF34D994BA9B7B2FB49304F1091E9D909A7399DB359E81CF40
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000001.00000002.4103023942.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_bf0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2ac1f79f219412d535bb54b06e8bd6b0b9b56458841145bf8303fb3760773849
              • Instruction ID: 8a67a68694ec9d1d24c15ab3d50d6b32940b1b01bd6e9c5284ce88849f088bed
              • Opcode Fuzzy Hash: 2ac1f79f219412d535bb54b06e8bd6b0b9b56458841145bf8303fb3760773849
              • Instruction Fuzzy Hash: 2B721874A01228CFDB25EF34D994BA9B7B2FB49304F1091E9D909A7399DB359E81CF40
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000001.00000002.4103023942.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_bf0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f254fbfa9f99ce71accf7e113f89db6e394e11816da65ff342fe4170175da00c
              • Instruction ID: 709c40d61bcd91a387eae418dda45d3d0f7b2b095cb934513ac4c2fae966128f
              • Opcode Fuzzy Hash: f254fbfa9f99ce71accf7e113f89db6e394e11816da65ff342fe4170175da00c
              • Instruction Fuzzy Hash: 2C620874A01228CFDB25EF34D994BA9B7B2FB49304F1091E9D909A7399CB359E85CF40
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000001.00000002.4103023942.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_bf0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 38fe8b39d3206d73a5da7f44e5027d065fd6ae2ddfa0dd8ae2cd34f385045d12
              • Instruction ID: 58dddcd76e61cb5003864cb621f861c8a81d55964f3c6d43621a10eec0a6c24a
              • Opcode Fuzzy Hash: 38fe8b39d3206d73a5da7f44e5027d065fd6ae2ddfa0dd8ae2cd34f385045d12
              • Instruction Fuzzy Hash: 38420774A01228CFDB25EF34D994BA9B7B1FB49304F1091EAD909A7398DB359E85CF40
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000001.00000002.4103023942.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_bf0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 018bcc96ad482b64939a3d0a252d941db7cd94b0b2d31cb57470c8afef9b23d2
              • Instruction ID: 67c2e7c9305f2cc6ea6f28ceb89ca5f0e0cb8de7dc0a20ea4c84d54bfb87199a
              • Opcode Fuzzy Hash: 018bcc96ad482b64939a3d0a252d941db7cd94b0b2d31cb57470c8afef9b23d2
              • Instruction Fuzzy Hash: 5C322674A01218CFDB24EF74D855BADB7F2EB49308F1045A9D509AB398DB399E85CF40
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000001.00000002.4103023942.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_bf0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 3dd967628c8a04087ea02cea6816df78ca8bc50fa17f3d477ed3d3bf66d131d0
              • Instruction ID: 5844f822d6bc2ef7854ba22da956d0ecbc9cb8ca57936ea90e14739f94cb19b1
              • Opcode Fuzzy Hash: 3dd967628c8a04087ea02cea6816df78ca8bc50fa17f3d477ed3d3bf66d131d0
              • Instruction Fuzzy Hash: FD220674A01228CFDB25EF24D994BA9B7F5FB49304F1081EAD909A7399CB359E85CF40
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000001.00000002.4103023942.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_bf0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 53585ad8a773b08c3a186f58dfa870e6107125aea2c3f519bdd36156783417ed
              • Instruction ID: afee56b09233ed6b2a1162af926aa1cf325d65f041d87c56fed9e12761ee794d
              • Opcode Fuzzy Hash: 53585ad8a773b08c3a186f58dfa870e6107125aea2c3f519bdd36156783417ed
              • Instruction Fuzzy Hash: F9020774A01228CFDB25EF34D895BA9B7B2FB49304F1051EAD909A7399DB359E81CF40
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000001.00000002.4103023942.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_bf0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b79c689a2c48f35cacbfbbfa472a65f173dd1dbe120fe16268519d6655e4633b
              • Instruction ID: b013dd8b0a4feee3c937a74bca85213070a0bd5b908ecc971e203beb01a1e5cf
              • Opcode Fuzzy Hash: b79c689a2c48f35cacbfbbfa472a65f173dd1dbe120fe16268519d6655e4633b
              • Instruction Fuzzy Hash: 32D16C35A01208DFCB19EFB5E451A6E77B2EF89348B208429D512977ACDF399C05CF90
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000001.00000002.4103023942.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_bf0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 041f2169896d3844250f664b41b461a69de28c4371a5e9f4ea59705364d46551
              • Instruction ID: 9a50f2b0b1551776bb54fa6b1994d4e55c3e875a964cdc94a910e369f15f4977
              • Opcode Fuzzy Hash: 041f2169896d3844250f664b41b461a69de28c4371a5e9f4ea59705364d46551
              • Instruction Fuzzy Hash: DBA1EE30659204CFD724EB3AD944BA932E2EB85394F2446E8D601DB3E9DF79DC49CB90
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000001.00000002.4103023942.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_bf0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 1758d8eda46187aef8fe031b06c22b0b18e3b4945dcd308bf2c82d6c208721fc
              • Instruction ID: 8984a76f381ba98579ba52d5568927bc2f7131ede1801609c225e11d014f0310
              • Opcode Fuzzy Hash: 1758d8eda46187aef8fe031b06c22b0b18e3b4945dcd308bf2c82d6c208721fc
              • Instruction Fuzzy Hash: C9D12974A01228CFDB25EF34D895BA9B7B1EB49304F1041EAD909A7398CB359E85CF40
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000001.00000002.4103023942.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_bf0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 5604f808276624ee5f0a7f5b45d419a8b0bf6ca139b31f7f724c033bd0cc65c5
              • Instruction ID: 5159c12def8ad1b7c30248577a59e87d464112591f3c4b4ae29ba6d520dc7201
              • Opcode Fuzzy Hash: 5604f808276624ee5f0a7f5b45d419a8b0bf6ca139b31f7f724c033bd0cc65c5
              • Instruction Fuzzy Hash: 62915B35A01204EFCB19EF75E451A6E77B2EF88348B608429E516977ACDF3A9C05CF80
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000001.00000002.4103023942.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_bf0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: fdf4ad8c48825af164886a1352f74f9e355438f183041c6b87f5922f15f9ad7f
              • Instruction ID: cc5ec8c1d9c3b370bb272f458000d497f00581092a7552b6b7ee25995b68e670
              • Opcode Fuzzy Hash: fdf4ad8c48825af164886a1352f74f9e355438f183041c6b87f5922f15f9ad7f
              • Instruction Fuzzy Hash: 42915B35A01204EFCB19EF75E451A6E73B2EF88348B608429E516977ACDF3A9C05CF80
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000001.00000002.4103023942.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_bf0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 8bfe6630f86fedce37fd14e65bf01a973d67f9a8eeca9dd870195b8a1a9ef6f6
              • Instruction ID: 06d70aafab4c5f8e320b0bc131b735528f7e3ffe0a3119e933f0553637f53e70
              • Opcode Fuzzy Hash: 8bfe6630f86fedce37fd14e65bf01a973d67f9a8eeca9dd870195b8a1a9ef6f6
              • Instruction Fuzzy Hash: 0E816B35A01204EFCB19EF75E451A6E73B2EF89348B608529E516977ACCF3A9C05CF80
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000001.00000002.4103023942.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_bf0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2764d323d432ee6cc54c4c8a5aa1ee1e6df566c85e523dcb5f738918a6dde19a
              • Instruction ID: f8f3ec6315b24370b4e0bee46da9bd2b9a77c400160d66f76f8b2685155a756d
              • Opcode Fuzzy Hash: 2764d323d432ee6cc54c4c8a5aa1ee1e6df566c85e523dcb5f738918a6dde19a
              • Instruction Fuzzy Hash: 79715B35A01204DFCB19AB76E451A6E73B2EF89348B60856DD906977ACDF3A9C05CF80
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000001.00000002.4103023942.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_bf0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 459bff0dba57e9b2f47c4fb8ece8f9463ec2482c98dd833bde201b17ccba9d7a
              • Instruction ID: 7b024b4a47f698a4974e6dd86148faf0ec76fd08366811c9d17902d9631170f1
              • Opcode Fuzzy Hash: 459bff0dba57e9b2f47c4fb8ece8f9463ec2482c98dd833bde201b17ccba9d7a
              • Instruction Fuzzy Hash: B951DF30B002548FCB15EB79D455AAE7BF2AF89308F2441B9C506EB359DB3A8806CBD1
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000001.00000002.4103023942.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_bf0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 75cd002c1e3601c196b5d8dace7b40720c720b080d4726b510376f1fdca0443d
              • Instruction ID: 7a0b491eb9fe9e49eb33d244bb75c90f88989ac7d6b5c157aaf17bb2ffa36257
              • Opcode Fuzzy Hash: 75cd002c1e3601c196b5d8dace7b40720c720b080d4726b510376f1fdca0443d
              • Instruction Fuzzy Hash: 01512430609205EFE724DB3AD8047B937E2EB45390F2885E4D601DB2E5EF34D94ACB20
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000001.00000002.4103023942.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_bf0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 19258e8a195a134f016600e42844865b094e6b77fbe928b7beb6a41d4ad4fcaa
              • Instruction ID: 5e2d9cedc1168f5becc5773a009dcfe8681b7cf54080861416a071ba63016212
              • Opcode Fuzzy Hash: 19258e8a195a134f016600e42844865b094e6b77fbe928b7beb6a41d4ad4fcaa
              • Instruction Fuzzy Hash: 65516F34A00214DFCB29AB79E85176E73E2EF85348F208569D916977ACCF399C11CF90
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000001.00000002.4103023942.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_bf0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: fc67bc5c0ea9ee81b5e75a3c961cb9a5889df79afb65709809b5b891f6ea9dc4
              • Instruction ID: c60f90dbef9d9fba12227b4f30b1828f2b4d4164dc170c68986084322974748d
              • Opcode Fuzzy Hash: fc67bc5c0ea9ee81b5e75a3c961cb9a5889df79afb65709809b5b891f6ea9dc4
              • Instruction Fuzzy Hash: C2410230649605DFDB24EB3A98057B833E2EB45394F2885E8D501DB2E5DF78CE4ADB20
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000001.00000002.4103023942.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_bf0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: db51f6e329b45ebd607ec92fe4982bf5661a59c772f5c72b95eaa8e10fbf6109
              • Instruction ID: 7e1afba4981612c8678c7234016e995a25416086e0db02d3fcd17c2f74e67e07
              • Opcode Fuzzy Hash: db51f6e329b45ebd607ec92fe4982bf5661a59c772f5c72b95eaa8e10fbf6109
              • Instruction Fuzzy Hash: D5415A30A01218CFDB24EBB9D951BECB7F2EF45308F1045A9D109AB295DB795E88CF51
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000001.00000002.4103023942.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_bf0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 1bf86dffda26e9b9312735745e092dcaf87e130e407b11443ddc4b08616fcc98
              • Instruction ID: dfc11bb998ab1abf6fc35161e9288218e828c02daea3b7785284f91559ee1c80
              • Opcode Fuzzy Hash: 1bf86dffda26e9b9312735745e092dcaf87e130e407b11443ddc4b08616fcc98
              • Instruction Fuzzy Hash: 7031BF31B102049FC714BB7AD812BBE32A7EF88208F1044799506D7BA9DF3D9D0A8B91
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000001.00000002.4103023942.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_bf0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 5aca7b0de5e3d437d63de9f6bb63f9722ea99e39815c78e638d07d076e1d2c70
              • Instruction ID: ceb6bb566c0e307fb2074c3e8a501d96ccb59b9f2f8c3951dd9b8fbafac475b8
              • Opcode Fuzzy Hash: 5aca7b0de5e3d437d63de9f6bb63f9722ea99e39815c78e638d07d076e1d2c70
              • Instruction Fuzzy Hash: 8C31A230B002099FDB14DF79D855BAEBBE6EF88344F2480B9D505AB3A4DB759D09CB90
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000001.00000002.4103023942.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_bf0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: c774cf01bd8b8afeba4be62ff9d4990610ff0805a0b1c73ba481d6a520d49295
              • Instruction ID: d2cf4453bd8a0fa76f687a29618df370b6c82201d62799421dff9fa759e85b64
              • Opcode Fuzzy Hash: c774cf01bd8b8afeba4be62ff9d4990610ff0805a0b1c73ba481d6a520d49295
              • Instruction Fuzzy Hash: 8131D3316083549FD715E778A822BAE3BA79BC2354F1485BDD101CB2D6CF794C06C792
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000001.00000002.4103042484.0000000000C00000.00000040.00000020.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_c00000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0c9a5afc2bdb35cdbd09aee911609fc6a795eef013b5ac97fa6c9eb7dd060740
              • Instruction ID: dc43ec7f9880ad9cf9037221d5e8bad41a2cb756bccab8ba6b20a17276432243
              • Opcode Fuzzy Hash: 0c9a5afc2bdb35cdbd09aee911609fc6a795eef013b5ac97fa6c9eb7dd060740
              • Instruction Fuzzy Hash: 0B21593510D7C18FD717CB24C950B54BFB1AB47218F2A86DED4848F6E3C23A8906DBA2
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000001.00000002.4103023942.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_bf0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f1d5a77847f1e986ed883a31cb2155a08c1e7e2abdc4a354a598563967c0f64b
              • Instruction ID: 55d41dabe19343643063713c11b9c81c62633d6babee0af56f6d13a0e6580ab5
              • Opcode Fuzzy Hash: f1d5a77847f1e986ed883a31cb2155a08c1e7e2abdc4a354a598563967c0f64b
              • Instruction Fuzzy Hash: CA11C2317082508FC325F77DA4226AD27D79BC6398724597DD001CB796CFAE8C0A87D2
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000001.00000002.4103042484.0000000000C00000.00000040.00000020.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_c00000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 44abb72b729c5986246ef7f54a693858230a4c1b7d72e4f547e0f509e5236919
              • Instruction ID: 9da66c3b301aef65137ca62efd61705d2cd477ce500b9bf22d812f7d4300abbb
              • Opcode Fuzzy Hash: 44abb72b729c5986246ef7f54a693858230a4c1b7d72e4f547e0f509e5236919
              • Instruction Fuzzy Hash: DC11B130204284DFE715CB14D980B66F7A5AB89718F34C9ACE9491BB93C77BD903CA51
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000001.00000002.4103023942.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_bf0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b1bc81b67c27c1ccf21c1cb7447d76295d7406b6ea75a46db1e3f99e5bffd890
              • Instruction ID: 69a41832617b85c41447209ae7db8566398d8e3bb00d06e742e211572ccb215d
              • Opcode Fuzzy Hash: b1bc81b67c27c1ccf21c1cb7447d76295d7406b6ea75a46db1e3f99e5bffd890
              • Instruction Fuzzy Hash: 4311AC71A002148F8F54EBB8A8155EE77F6EB8F344B20457DC909E7788DB398D02CB90
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000001.00000002.4103023942.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_bf0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 157411a2b8b876dc043b3fa05574b4bce1f724a2c4ae602fe4f6f34eb6530e94
              • Instruction ID: 4cb33244dbf69f24d3bd952254252ccacfbddc1731bde4d41a0418579b3df05f
              • Opcode Fuzzy Hash: 157411a2b8b876dc043b3fa05574b4bce1f724a2c4ae602fe4f6f34eb6530e94
              • Instruction Fuzzy Hash: 27119D9244E3C29FC31383305C34680BF702A53205B4E86DBD491CA2ABE25C2919D363
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000001.00000002.4103042484.0000000000C00000.00000040.00000020.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_c00000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0bf27a8bc510404908f4ea1ba8b79b3f2f28297ee68a615fc9814409cf70022f
              • Instruction ID: 8a8d52fb13753ba80ec074afcee5d1bf6ed14b1726cae17bd98f28b401dc95f0
              • Opcode Fuzzy Hash: 0bf27a8bc510404908f4ea1ba8b79b3f2f28297ee68a615fc9814409cf70022f
              • Instruction Fuzzy Hash: EC0186B65093806FD7128F169C41866FFA8DB86620709C4AFEC498B652D265A909C7B1
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000001.00000002.4103023942.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_bf0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 998a95d8cbf8327df8680864f03040c1b82a9e339205a8b863a8dd604d6521a5
              • Instruction ID: fad717c0e39d93aa972f050968c4982c387a66ffc60f67bc487e16a6466b3d98
              • Opcode Fuzzy Hash: 998a95d8cbf8327df8680864f03040c1b82a9e339205a8b863a8dd604d6521a5
              • Instruction Fuzzy Hash: 9D111C74E05118CFEB24EBB8D9617ACB7F1AB48304F5041AAD519A7282DB390A84CF51
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000001.00000002.4103023942.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_bf0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ccd70349dce9741af60bbf87c634d44a7cdf3270e6a23165f8260abcdc0c761e
              • Instruction ID: f6928e50c3de32133001bea7f1d977b7f06887fea546aabea5c5c14b5aa1d462
              • Opcode Fuzzy Hash: ccd70349dce9741af60bbf87c634d44a7cdf3270e6a23165f8260abcdc0c761e
              • Instruction Fuzzy Hash: 4401923060A242CFCB10FB78E648ADC7BE1EFC9358B05886CE4458B75ADB799845DF42
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000001.00000002.4103023942.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_bf0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b4055fb330a7a4c648e6b61b9caf3846e97bd6197de116dfa60cfa67f88eaf67
              • Instruction ID: 07712406fc0fd1148f487d00e0874ec7d8384d597f8064932f8b919e31eecb86
              • Opcode Fuzzy Hash: b4055fb330a7a4c648e6b61b9caf3846e97bd6197de116dfa60cfa67f88eaf67
              • Instruction Fuzzy Hash: 87F09672A403149FEB14DB709813BAE7B72EF81714F1085AEE2459B1D5EA355941C780
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000001.00000002.4103023942.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_bf0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 3902ad6b25a165912bfa42b5584efb922bedcfaa1051a18e71c51b1d36ecbdf8
              • Instruction ID: e6efbdaf3d04b6df491059272728360c806af9c90ae82fad0b8fbd1ce7f9e3d5
              • Opcode Fuzzy Hash: 3902ad6b25a165912bfa42b5584efb922bedcfaa1051a18e71c51b1d36ecbdf8
              • Instruction Fuzzy Hash: 36F01720A5E3C05FC707CB345C604997FB19E4321871A46EBC485CB6A3D5290A0AD762
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000001.00000002.4103042484.0000000000C00000.00000040.00000020.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_c00000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 4280bab020fe13ced9069026e0efe0e9e5a243a94884462047c531553b3c09eb
              • Instruction ID: 8e2e15e7a3d3598feb70126c67a84cb459c1f623ae18907ad6fbb30c398a0207
              • Opcode Fuzzy Hash: 4280bab020fe13ced9069026e0efe0e9e5a243a94884462047c531553b3c09eb
              • Instruction Fuzzy Hash: 2DF01935108644DFC316CF00D980B25FBA2FB89718F24CAADE9490BB62C737E913DA81
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000001.00000002.4103042484.0000000000C00000.00000040.00000020.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_c00000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a09143516398c4f6acce0c321383adcd70ccaeec0dc9881f7fcc91881f07302e
              • Instruction ID: 2b03f566037087d0ec87e46fd67246a53a9a814235e3d1bb5d940911d600f6a2
              • Opcode Fuzzy Hash: a09143516398c4f6acce0c321383adcd70ccaeec0dc9881f7fcc91881f07302e
              • Instruction Fuzzy Hash: 9EE092B66006009BD650DF0AEC41456F7D8EB88631B08C47FEC0D8B701E276B509CAA5
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000001.00000002.4103023942.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_bf0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 5cf65090e83693cec3f9b5ba513891cb207614e1dd7f13bafc9473bc91f09181
              • Instruction ID: 4f2f0c2b4e0cd0b7fb34e222fec357b5f30730236ce277e8e1f323166a66b5c5
              • Opcode Fuzzy Hash: 5cf65090e83693cec3f9b5ba513891cb207614e1dd7f13bafc9473bc91f09181
              • Instruction Fuzzy Hash: 68E04FB1D0021D9F8F40EFBE99455EFBFF8EA48254B10047AC208E3200E7394201CBD5
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000001.00000002.4103023942.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_bf0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b6fdf07c5abf9cb90b35809ce295dfbefab5b6b7ad789460d6c4fcaf24c80f56
              • Instruction ID: 0006dbaf2ab80c1a62d9c7c68a2f3afe22aa1da7cde403b220825ddd138311f8
              • Opcode Fuzzy Hash: b6fdf07c5abf9cb90b35809ce295dfbefab5b6b7ad789460d6c4fcaf24c80f56
              • Instruction Fuzzy Hash: 92E08C3015A790CFC71A6B34646588C3B72AF8630835904BEC0468FBA7D63AC447CB40
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000001.00000002.4103023942.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_bf0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: c74ba5b030c761a60f0113d4b2ef02ebbd1be8af44c63dace1925c75f97b4167
              • Instruction ID: 1b3801d43d5ea1ebc0a764e68fe05f2fe1fa58d6009b549fa0290426ecc36e24
              • Opcode Fuzzy Hash: c74ba5b030c761a60f0113d4b2ef02ebbd1be8af44c63dace1925c75f97b4167
              • Instruction Fuzzy Hash: 91D0C971A15208EF8B44DFA8DD0189DBBF9EB45215B1041EAA809D3750EE325F04EB81
              Uniqueness

              Uniqueness Score: -1.00%