Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
K59gVXTgGv.exe

Overview

General Information

Sample name:K59gVXTgGv.exe
renamed because original name is a hash value
Original sample name:b7ca45674c6b8a24a6a71315e0e51397.exe
Analysis ID:1465048
MD5:b7ca45674c6b8a24a6a71315e0e51397
SHA1:79516b1bd2227f08ff333b950dafb29707916828
SHA256:63d2c37fdb370cf6e743bd75e7408f5eded5bc823a29401eeafe0bea921657bb
Tags:32exetrojan
Infos:

Detection

AsyncRAT, DarkTortilla, Njrat, StormKitty
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected AntiVM3
Yara detected AsyncRAT
Yara detected DarkTortilla Crypter
Yara detected Njrat
Yara detected StormKitty Stealer
Yara detected Telegram RAT
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to capture screen (.Net source)
Contains functionality to log keystrokes (.Net Source)
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries Google from non browser process on port 80
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the program root directory (C:\Program Files)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
May infect USB drives
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Startup Folder File Write
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • K59gVXTgGv.exe (PID: 5160 cmdline: "C:\Users\user\Desktop\K59gVXTgGv.exe" MD5: B7CA45674C6B8A24A6A71315E0E51397)
    • cmd.exe (PID: 1876 cmdline: "cmd" /c ping 127.0.0.1 -n 43 > nul && copy "C:\Users\user\Desktop\K59gVXTgGv.exe" "C:\Program Files (x86)\Google Chrome sandbox.exe.exe" && ping 127.0.0.1 -n 43 > nul && "C:\Program Files (x86)\Google Chrome sandbox.exe.exe" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 2680 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • PING.EXE (PID: 1276 cmdline: ping 127.0.0.1 -n 43 MD5: B3624DD758CCECF93A1226CEF252CA12)
      • PING.EXE (PID: 5060 cmdline: ping 127.0.0.1 -n 43 MD5: B3624DD758CCECF93A1226CEF252CA12)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AsyncRATAsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.asyncrat
NameDescriptionAttributionBlogpost URLsLink
DarkTortillaDarkTortilla is a complex and highly configurable .NET-based crypter that has possibly been active since at least August 2015. It typically delivers popular information stealers and remote access trojans (RATs) such as AgentTesla, AsyncRat, NanoCore, and RedLine. While it appears to primarily deliver commodity malware, Secureworks Counter Threat Unit (CTU) researchers identified DarkTortilla samples delivering targeted payloads such as Cobalt Strike and Metasploit. It can also deliver "addon packages" such as additional malicious payloads, benign decoy documents, and executables. It features robust anti-analysis and anti-tamper controls that can make detection, analysis, and eradication challenging.From January 2021 through May 2022, an average of 93 unique DarkTortilla samples per week were uploaded to the VirusTotal analysis service. Code similarities suggest possible links between DarkTortilla and other malware: a crypter operated by the RATs Crew threat group, which was active between 2008 and 2012, and the Gameloader malware that emerged in 2021.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.darktortilla
NameDescriptionAttributionBlogpost URLsLink
NjRATRedPacket Security describes NJRat as "a remote access trojan (RAT) has capabilities to log keystrokes, access the victim's camera, steal credentials stored in browsers, open a reverse shell, upload/download files, view the victim's desktop, perform process, file, and registry manipulations, and capabilities to let the attacker update, uninstall, restart, close, disconnect the RAT and rename its campaign ID. Through the Command & Control (CnC) server software, the attacker has capabilities to create and configure the malware to spread through USB drives."It is supposedly popular with actors in the Middle East. Similar to other RATs, many leaked builders may be backdoored.
  • AQUATIC PANDA
  • Earth Lusca
  • Operation C-Major
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.njrat
NameDescriptionAttributionBlogpost URLsLink
Cameleon, StormKittyPWC describes this malware as a backdoor, capable of file management, upload and download of files, and execution of commands.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cameleon
{"Server": "127.0.0.1", "Ports": "6606,7707,8808", "Telegram C2": "https://api.telegram.org/bot7095863454:AAFGhBQqJXY7rFzi0CT99qZPVRwQpKI6R1A/sendMessage?chat_id=7257613869", "Version": "", "AES_key": "VIfxfqryUTyZUBGDCBAvbYVYIsexIM7Z", "Mutex": "AsyncMutex_6SI8OkPnk", "Certificate": "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", "ServerSignature": "J7XpD4w+JaFzTixc0nCmiRA4ZP4bPCIpEYYGofNxvC1+0OsFQr56oTWwQMosnOTB64TZRGSdXVHKzjVchQf7X5Uwu/KQU61NPArjxWVScwKZXOGS4ZNzsWbrxgztkmlyRlQgvEq4rdFsqy1bfvHEoQ/s9aDXBNoLPPjJOexTRQSGuZYMpGSUD+ZUiVwPqqFWTb8KcjEMyABMeXGKfia2e9u8ePKpWv4HSiOfl6N47tTtIfN2FW/2mCX7BOnIZwCl3UxaQnITN812tHD1enX9TK86R91F02c0wabnf4oC07S3cqiXYo1yZ5y3dDnnERLagBuX1bemwzX/7DjHkfOaIPLgAAO8vGHbQX3pPqmwC88sG1+FExp3FEKMITnQTqQr5uXa5GjggFUSFr9rt2nfcjEjHRnOzX1jpsUUtuDyqoAFhdosdv46x+o5Iod34II88nouxzyzAfMSa48ozukJ3fCknI6u9fj/it1dx0GimhXUv4YG4A19n3EdvJbaxZXImHZvqiYGsHTIUtxa89QhxCpuJPKdTP7ya5rJFkDT0Z8ijH4Z1Dv42umyEN6PT99JRuJHcXSqkXfOeOilnM6YRY019FHq6udNVWn5OQetK4ULVcQmwPTV26ZRPyrqO57Rjr5LeSauZtNKTE/kmS1iR3eMtq5PsAHunrHZPzzaUhY=", "Group": "Default"}
{"Host": "194.26.192.92", "Port": "5552", "Version": "im523", "Campaign ID": "HacKed", "Install Name": "server.exe", "Install Dir": "TEMP"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.2386535902.0000000003146000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_NjratYara detected NjratJoe Security
    00000000.00000002.2386535902.0000000003146000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DarkTortillaYara detected DarkTortilla CrypterJoe Security
      00000000.00000002.2386535902.0000000003146000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
        00000000.00000002.2386535902.0000000003146000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Njrat_30f3c220unknownunknown
        • 0xe0f1:$a1: get_Registry
        • 0xfb16:$a3: Download ERROR
        • 0xfe08:$a5: netsh firewall delete allowedprogram "
        00000000.00000002.2386535902.0000000003146000.00000004.00000800.00020000.00000000.sdmpnjrat1Identify njRatBrian Wallace @botnet_hunter
        • 0xfcfe:$a1: netsh firewall add allowedprogram
        • 0xfef8:$b1: [TAP]
        • 0xfe9e:$b2: & exit
        • 0xfe6a:$c1: md.exe /k ping 0 & del
        Click to see the 39 entries
        SourceRuleDescriptionAuthorStrings
        0.2.K59gVXTgGv.exe.2f72050.0.unpackJoeSecurity_NjratYara detected NjratJoe Security
          0.2.K59gVXTgGv.exe.2f72050.0.unpackJoeSecurity_DarkTortillaYara detected DarkTortilla CrypterJoe Security
            0.2.K59gVXTgGv.exe.2f72050.0.unpackWindows_Trojan_Njrat_30f3c220unknownunknown
            • 0x46c1:$a1: get_Registry
            • 0x60e6:$a3: Download ERROR
            • 0x63d8:$a5: netsh firewall delete allowedprogram "
            0.2.K59gVXTgGv.exe.2f72050.0.unpacknjrat1Identify njRatBrian Wallace @botnet_hunter
            • 0x62ce:$a1: netsh firewall add allowedprogram
            • 0x64c8:$b1: [TAP]
            • 0x646e:$b2: & exit
            • 0x643a:$c1: md.exe /k ping 0 & del
            0.2.K59gVXTgGv.exe.2f72050.0.unpackMALWARE_Win_NjRATDetects NjRAT / BladabindiditekSHen
            • 0x63d8:$s1: netsh firewall delete allowedprogram
            • 0x62ce:$s2: netsh firewall add allowedprogram
            • 0x6438:$s3: 63 00 6D 00 64 00 2E 00 65 00 78 00 65 00 20 00 2F 00 6B 00 20 00 70 00 69 00 6E 00 67
            • 0x60c2:$s4: Execute ERROR
            • 0x6122:$s4: Execute ERROR
            • 0x60e6:$s5: Download ERROR
            • 0x647e:$s6: [kl]
            Click to see the 157 entries

            System Summary

            barindex
            Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Users\user\Desktop\K59gVXTgGv.exe, ProcessId: 5160, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Google Chrome sandbox.exe.lnk
            No Snort rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: K59gVXTgGv.exeAvira: detected
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeAvira: detection malicious, Label: HEUR/AGEN.1304596
            Source: 00000000.00000002.2386535902.0000000003146000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Njrat {"Host": "194.26.192.92", "Port": "5552", "Version": "im523", "Campaign ID": "HacKed", "Install Name": "server.exe", "Install Dir": "TEMP"}
            Source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.raw.unpackMalware Configuration Extractor: AsyncRAT {"Server": "127.0.0.1", "Ports": "6606,7707,8808", "Telegram C2": "https://api.telegram.org/bot7095863454:AAFGhBQqJXY7rFzi0CT99qZPVRwQpKI6R1A/sendMessage?chat_id=7257613869", "Version": "", "AES_key": "VIfxfqryUTyZUBGDCBAvbYVYIsexIM7Z", "Mutex": "AsyncMutex_6SI8OkPnk", "Certificate": "MIIE9jCCAt6gAwIBAgIQAKQXqY8ZdB/modqi69mWGTANBgkqhkiG9w0BAQ0FADAcMRowGAYDVQQDDBFXb3JsZFdpbmQgU3RlYWxlcjAgFw0yMTA3MTMwNDUxMDZaGA85OTk5MTIzMTIzNTk1OVowHDEaMBgGA1UEAwwRV29ybGRXaW5kIFN0ZWFsZXIwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCnRXYoxuLqqgXdcvIAYWb9DuVRl5ZpdpPfoIgmb7Y9A9AuiddKNm4is8EvIlEh98bQD4OBaK0EGWuj7WuAcQPCCGuzHpDqFZbXR7iRqVn6TiLRsO0LCMB4ta4XLQ4JdTFXvnQHcGiUxHddH70T/2P2bBVY0W+PVJDzG3XUWHpYb4PVv7qaQr/DalR3qyyd5otzE1kIjJLCOCyI/9ntIcD/PbMTKVnCP4fzbnkNB+xy0PmQmx3WRWEF5q72TdgaKrCbOpR2C/+rfGIoPC6Ze6dqWO3bQLGt6jpCO8A4CtAaAYmiw1vHUOfP54BgI9ls1TjYO3Rn4R1jmhWBGV2pT5chrglgSxMzPhrxFTQljG78RlPCJmyagJbtnPL3AlV34sQggcbf+80FVeyechm/xrMTSWXrJQ+xek1HRJBDFoCJyUR7SuIUelOW24TU+rwl/2dcALLZXpjYu3/zvJjH4iaJXRCt7oWhfzIFG1bHBFr78kV9VP0H+ZNVb129eUr14F/uubAoIPAz2EHG/CXBZv9GkFuzw0NgsI1eP7AznCLdT+z91M+yB7vWtvclwQ5k6MxWDPOraG5JMjUHvKI6zvyZ4IQ2a7bUENDghxLAqIxgo7zfZMdrjbRxBlqW14oki6Um7GpGKEZ0s2Ip6K2yJHBLpbVxOYjyzrxohMguh+qvgQIDAQABozIwMDAdBgNVHQ4EFgQUmTejTtK6on20N0YJez5sAZdMe/kwDwYDVR0TAQH/BAUwAwEB/zANBgkqhkiG9w0BAQ0FAAOCAgEAhauA0si7sHBd06DSGJgP5vJxL2daW30wR5XbAJd0HWj3QWfl7w27iyZ5AqBT4B0ojLNuMUG8mUOvpcoq0m80qUX7TIKUULKvb+i7uGGEDxk3W5F3es/CTUUWO0QlseWx9QEYziGlp6f3tkP4PTGSL0DywVRSa8l6f/B5kqwnW17CbQfJZ8vmy5snpDO/avgYssUnQtKQPhos7GbokNHps/bxEIRfLeprzQox20dw4RV59LcorjP5QV7Vc6FuYmhzC0nfRetTHckyxg66O3ekfTVs87MLiDV0ipQ+D/6k3g6DRuTdd4V2khjtI56ujSqTQ2PueNQXPu8y2fdsT2Rd1LcfxMS1xKAhSwhHfyy0I3JwzPG1D+sm3QNJEOoJviSNn5fYOFpY+mSEkFNMMeEbwOFdHxWbkiJk/Z8VwdH5I52tkHU3sRQMuZHtcKUc/SIt5Ivv6gtuEZQdm1GE6KUdiRB95s8JVGNlCcHX5bXbScu4eKCRQn3Cl+m5KR4EzI6hVP/iDRhVKj7Dn/blOHLzhNS5vW4X085dTP+1TBL8CHpQpiA3t8LfqfV1b/+WahOd3jNBNTXXfe/AQSjErgctLMdmOBpUQaJLOlcDcKGxWQdOo102nxg8Y/kFDARccywugoQxuIZpMYq74tjnJlJZ9kqR/LPrjmvx4v+0XFsaCPE=", "ServerSignature": "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", "Group": "Default"}
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeReversingLabs: Detection: 67%
            Source: K59gVXTgGv.exeReversingLabs: Detection: 67%
            Source: K59gVXTgGv.exeVirustotal: Detection: 64%Perma Link
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.2f72050.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.4015f19.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.314dc30.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f41529.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.314dc30.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.2f72050.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.4015f19.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f158fa.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3fea2ea.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f41529.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.2386535902.0000000003146000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2386535902.0000000002F37000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2388229518.0000000003FEA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2388229518.0000000003EE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: K59gVXTgGv.exe PID: 5160, type: MEMORYSTR
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeJoe Sandbox ML: detected
            Source: K59gVXTgGv.exeJoe Sandbox ML: detected
            Source: K59gVXTgGv.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: K59gVXTgGv.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: K59gVXTgGv.exe, 00000000.00000002.2386535902.0000000003146000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: autorun.inf
            Source: K59gVXTgGv.exe, 00000000.00000002.2386535902.0000000003146000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: [autorun]
            Source: K59gVXTgGv.exe, 00000000.00000002.2388229518.0000000003FEA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: autorun.inf
            Source: K59gVXTgGv.exe, 00000000.00000002.2388229518.0000000003FEA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: [autorun]
            Source: K59gVXTgGv.exe, 00000000.00000002.2388229518.0000000003EE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: autorun.inf
            Source: K59gVXTgGv.exe, 00000000.00000002.2388229518.0000000003EE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: [autorun]
            Source: K59gVXTgGv.exe, 00000000.00000002.2386535902.0000000002F37000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: autorun.inf
            Source: K59gVXTgGv.exe, 00000000.00000002.2386535902.0000000002F37000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: [autorun]
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]0_2_02D19F98
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]0_2_02D1A1D8

            Networking

            barindex
            Source: Malware configuration extractorURLs: 194.26.192.92
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeHTTP traffic: GET / HTTP/1.1 Host: www.google.com Connection: Keep-Alive
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeHTTP traffic: GET / HTTP/1.1 Host: www.google.com Connection: Keep-Alive
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 43
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.401f560.8.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.4015f19.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f158fa.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3fea2ea.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f41529.3.raw.unpack, type: UNPACKEDPE
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.google.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.google.comConnection: Keep-Alive
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.google.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.google.comConnection: Keep-Alive
            Source: global trafficDNS traffic detected: DNS query: www.google.com
            Source: cmd.exe, 00000004.00000003.2797214775.0000000003147000.00000004.00000020.00020000.00000000.sdmp, K59gVXTgGv.exe, Google Chrome sandbox.exe.exe.4.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
            Source: cmd.exe, 00000004.00000003.2797214775.0000000003147000.00000004.00000020.00020000.00000000.sdmp, K59gVXTgGv.exe, Google Chrome sandbox.exe.exe.4.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
            Source: cmd.exe, 00000004.00000003.2797214775.0000000003147000.00000004.00000020.00020000.00000000.sdmp, K59gVXTgGv.exe, Google Chrome sandbox.exe.exe.4.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
            Source: cmd.exe, 00000004.00000003.2797214775.0000000003147000.00000004.00000020.00020000.00000000.sdmp, K59gVXTgGv.exe, Google Chrome sandbox.exe.exe.4.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
            Source: cmd.exe, 00000004.00000003.2797214775.0000000003147000.00000004.00000020.00020000.00000000.sdmp, K59gVXTgGv.exe, Google Chrome sandbox.exe.exe.4.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
            Source: cmd.exe, 00000004.00000003.2797214775.0000000003147000.00000004.00000020.00020000.00000000.sdmp, K59gVXTgGv.exe, Google Chrome sandbox.exe.exe.4.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
            Source: cmd.exe, 00000004.00000003.2797214775.0000000003147000.00000004.00000020.00020000.00000000.sdmp, K59gVXTgGv.exe, Google Chrome sandbox.exe.exe.4.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
            Source: Google Chrome sandbox.exe.exe.4.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
            Source: cmd.exe, 00000004.00000003.2797214775.0000000003147000.00000004.00000020.00020000.00000000.sdmp, K59gVXTgGv.exe, Google Chrome sandbox.exe.exe.4.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
            Source: cmd.exe, 00000004.00000003.2797214775.0000000003147000.00000004.00000020.00020000.00000000.sdmp, K59gVXTgGv.exe, Google Chrome sandbox.exe.exe.4.drString found in binary or memory: http://ocsp.digicert.com0
            Source: cmd.exe, 00000004.00000003.2797214775.0000000003147000.00000004.00000020.00020000.00000000.sdmp, K59gVXTgGv.exe, Google Chrome sandbox.exe.exe.4.drString found in binary or memory: http://ocsp.digicert.com0A
            Source: cmd.exe, 00000004.00000003.2797214775.0000000003147000.00000004.00000020.00020000.00000000.sdmp, K59gVXTgGv.exe, Google Chrome sandbox.exe.exe.4.drString found in binary or memory: http://ocsp.digicert.com0C
            Source: cmd.exe, 00000004.00000003.2797214775.0000000003147000.00000004.00000020.00020000.00000000.sdmp, K59gVXTgGv.exe, Google Chrome sandbox.exe.exe.4.drString found in binary or memory: http://ocsp.digicert.com0X
            Source: K59gVXTgGv.exe, 00000000.00000002.2386535902.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, Google Chrome sandbox.exe.exe, 0000000A.00000002.3262432650.0000000002AE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: cmd.exe, 00000004.00000003.2797214775.0000000003147000.00000004.00000020.00020000.00000000.sdmp, K59gVXTgGv.exe, Google Chrome sandbox.exe.exe.4.drString found in binary or memory: http://www.digicert.com/CPS0
            Source: K59gVXTgGv.exe, Google Chrome sandbox.exe.exe.4.drString found in binary or memory: http://www.google.com
            Source: K59gVXTgGv.exe, 00000000.00000002.2386535902.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, Google Chrome sandbox.exe.exe, 0000000A.00000002.3261484937.0000000000F69000.00000004.00000020.00020000.00000000.sdmp, Google Chrome sandbox.exe.exe, 0000000A.00000002.3262432650.0000000002AE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.google.com/
            Source: K59gVXTgGv.exe, 00000000.00000002.2388229518.0000000003EE0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
            Source: K59gVXTgGv.exe, 00000000.00000002.2388229518.0000000003FEA000.00000004.00000800.00020000.00000000.sdmp, K59gVXTgGv.exe, 00000000.00000002.2388229518.0000000003EE0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/file/bot
            Source: K59gVXTgGv.exe, 00000000.00000002.2386535902.0000000002E6F000.00000004.00000800.00020000.00000000.sdmp, Google Chrome sandbox.exe.exe, 0000000A.00000002.3262432650.0000000002B0F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://csp.withgoogle.com/csp/gws/other-hp
            Source: K59gVXTgGv.exe, 00000000.00000002.2386535902.0000000003146000.00000004.00000800.00020000.00000000.sdmp, K59gVXTgGv.exe, 00000000.00000002.2388229518.0000000003FEA000.00000004.00000800.00020000.00000000.sdmp, K59gVXTgGv.exe, 00000000.00000002.2388229518.0000000003EE0000.00000004.00000800.00020000.00000000.sdmp, K59gVXTgGv.exe, 00000000.00000002.2386535902.0000000002F37000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://dl.dropbox.com/s/p84aaz28t0hepul/Pass.exe?dl=0
            Source: K59gVXTgGv.exe, 00000000.00000002.2388229518.0000000003FEA000.00000004.00000800.00020000.00000000.sdmp, K59gVXTgGv.exe, 00000000.00000002.2388229518.0000000003EE0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/LimerBoy/StormKitty
            Source: K59gVXTgGv.exe, 00000000.00000002.2388229518.0000000003FEA000.00000004.00000800.00020000.00000000.sdmp, K59gVXTgGv.exe, 00000000.00000002.2388229518.0000000003EE0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pastebin.com/raw/7B75u64B
            Source: K59gVXTgGv.exe, 00000000.00000002.2388229518.0000000003FEA000.00000004.00000800.00020000.00000000.sdmp, K59gVXTgGv.exe, 00000000.00000002.2388229518.0000000003EE0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/LimerBoy/StormKitty/master/StormKitty/stub/packages/DotNetZip.1.13

            Key, Mouse, Clipboard, Microphone and Screen Capturing

            barindex
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.401f560.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3fea2ea.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f158fa.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.401f560.8.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.4015f19.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f158fa.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3fea2ea.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f41529.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.2388229518.0000000003FEA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2388229518.0000000003EE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: K59gVXTgGv.exe PID: 5160, type: MEMORYSTR
            Source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.raw.unpack, DesktopScreenshot.cs.Net Code: Make
            Source: 0.2.K59gVXTgGv.exe.3fea2ea.2.raw.unpack, DesktopScreenshot.cs.Net Code: Make
            Source: 0.2.K59gVXTgGv.exe.401f560.8.raw.unpack, DesktopScreenshot.cs.Net Code: Make
            Source: 0.2.K59gVXTgGv.exe.3f158fa.7.raw.unpack, DesktopScreenshot.cs.Net Code: Make
            Source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.raw.unpack, Keylogger.cs.Net Code: SetHook
            Source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.raw.unpack, Keylogger.cs.Net Code: KeyboardLayout
            Source: 0.2.K59gVXTgGv.exe.2f72050.0.raw.unpack, kl.cs.Net Code: VKCodeToUnicode
            Source: 0.2.K59gVXTgGv.exe.3fea2ea.2.raw.unpack, Keylogger.cs.Net Code: SetHook
            Source: 0.2.K59gVXTgGv.exe.3fea2ea.2.raw.unpack, Keylogger.cs.Net Code: KeyboardLayout
            Source: 0.2.K59gVXTgGv.exe.401f560.8.raw.unpack, Keylogger.cs.Net Code: SetHook
            Source: 0.2.K59gVXTgGv.exe.401f560.8.raw.unpack, Keylogger.cs.Net Code: KeyboardLayout
            Source: 0.2.K59gVXTgGv.exe.314dc30.1.raw.unpack, kl.cs.Net Code: VKCodeToUnicode
            Source: 0.2.K59gVXTgGv.exe.3f158fa.7.raw.unpack, Keylogger.cs.Net Code: SetHook
            Source: 0.2.K59gVXTgGv.exe.3f158fa.7.raw.unpack, Keylogger.cs.Net Code: KeyboardLayout
            Source: 0.2.K59gVXTgGv.exe.4015f19.4.raw.unpack, kl.cs.Net Code: VKCodeToUnicode
            Source: 0.2.K59gVXTgGv.exe.3f41529.3.raw.unpack, kl.cs.Net Code: VKCodeToUnicode

            E-Banking Fraud

            barindex
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.2f72050.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.4015f19.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.314dc30.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f41529.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.314dc30.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.2f72050.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.4015f19.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f158fa.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3fea2ea.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f41529.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.2386535902.0000000003146000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2386535902.0000000002F37000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2388229518.0000000003FEA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2388229518.0000000003EE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: K59gVXTgGv.exe PID: 5160, type: MEMORYSTR

            System Summary

            barindex
            Source: 0.2.K59gVXTgGv.exe.2f72050.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
            Source: 0.2.K59gVXTgGv.exe.2f72050.0.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 0.2.K59gVXTgGv.exe.2f72050.0.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.4015f19.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
            Source: 0.2.K59gVXTgGv.exe.4015f19.4.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 0.2.K59gVXTgGv.exe.4015f19.4.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.314dc30.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
            Source: 0.2.K59gVXTgGv.exe.314dc30.1.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 0.2.K59gVXTgGv.exe.314dc30.1.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.3f41529.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
            Source: 0.2.K59gVXTgGv.exe.3f41529.3.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 0.2.K59gVXTgGv.exe.3f41529.3.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.401f560.8.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.401f560.8.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.401f560.8.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing many VPN software clients. Observed in infosteslers Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.401f560.8.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.401f560.8.unpack, type: UNPACKEDPEMatched rule: Detects StormKitty infostealer Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.314dc30.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
            Source: 0.2.K59gVXTgGv.exe.314dc30.1.raw.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 0.2.K59gVXTgGv.exe.314dc30.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.3fea2ea.2.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.3fea2ea.2.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.3fea2ea.2.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing many VPN software clients. Observed in infosteslers Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.3fea2ea.2.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.3fea2ea.2.unpack, type: UNPACKEDPEMatched rule: Detects StormKitty infostealer Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.2f72050.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
            Source: 0.2.K59gVXTgGv.exe.2f72050.0.raw.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 0.2.K59gVXTgGv.exe.2f72050.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.3f158fa.7.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.3f158fa.7.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.3f158fa.7.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing many VPN software clients. Observed in infosteslers Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.3f158fa.7.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.3f158fa.7.unpack, type: UNPACKEDPEMatched rule: Detects StormKitty infostealer Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing many VPN software clients. Observed in infosteslers Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.unpack, type: UNPACKEDPEMatched rule: Detects StormKitty infostealer Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
            Source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects njRAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.raw.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing many VPN software clients. Observed in infosteslers Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects StormKitty infostealer Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.401f560.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.401f560.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.401f560.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing many VPN software clients. Observed in infosteslers Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.401f560.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.401f560.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects StormKitty infostealer Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.4015f19.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
            Source: 0.2.K59gVXTgGv.exe.4015f19.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects njRAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 0.2.K59gVXTgGv.exe.4015f19.4.raw.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 0.2.K59gVXTgGv.exe.4015f19.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.4015f19.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.4015f19.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing many VPN software clients. Observed in infosteslers Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.4015f19.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.4015f19.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects StormKitty infostealer Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.4015f19.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.3f158fa.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
            Source: 0.2.K59gVXTgGv.exe.3f158fa.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects njRAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 0.2.K59gVXTgGv.exe.3f158fa.7.raw.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 0.2.K59gVXTgGv.exe.3f158fa.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.3f158fa.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.3f158fa.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing many VPN software clients. Observed in infosteslers Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.3f158fa.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.3f158fa.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects StormKitty infostealer Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.3f158fa.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.3fea2ea.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
            Source: 0.2.K59gVXTgGv.exe.3fea2ea.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects njRAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 0.2.K59gVXTgGv.exe.3fea2ea.2.raw.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 0.2.K59gVXTgGv.exe.3fea2ea.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.3fea2ea.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.3fea2ea.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing many VPN software clients. Observed in infosteslers Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.3fea2ea.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.3fea2ea.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects StormKitty infostealer Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.3fea2ea.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.3f41529.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
            Source: 0.2.K59gVXTgGv.exe.3f41529.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects njRAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 0.2.K59gVXTgGv.exe.3f41529.3.raw.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 0.2.K59gVXTgGv.exe.3f41529.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.3f41529.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.3f41529.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing many VPN software clients. Observed in infosteslers Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.3f41529.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.3f41529.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects StormKitty infostealer Author: ditekSHen
            Source: 0.2.K59gVXTgGv.exe.3f41529.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: 00000000.00000002.2386535902.0000000003146000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
            Source: 00000000.00000002.2386535902.0000000003146000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000000.00000002.2386535902.0000000002F37000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
            Source: 00000000.00000002.2386535902.0000000002F37000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000000.00000002.2388229518.0000000003FEA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
            Source: 00000000.00000002.2388229518.0000000003FEA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects njRAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000000.00000002.2388229518.0000000003FEA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000000.00000002.2388229518.0000000003FEA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 00000000.00000002.2388229518.0000000003FEA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
            Source: 00000000.00000002.2388229518.0000000003EE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
            Source: 00000000.00000002.2388229518.0000000003EE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects njRAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000000.00000002.2388229518.0000000003EE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000000.00000002.2388229518.0000000003EE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 00000000.00000002.2388229518.0000000003EE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
            Source: Process Memory Space: K59gVXTgGv.exe PID: 5160, type: MEMORYSTRMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: Process Memory Space: K59gVXTgGv.exe PID: 5160, type: MEMORYSTRMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeCode function: 0_2_02D16E010_2_02D16E01
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeCode function: 0_2_02D112A70_2_02D112A7
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeCode function: 0_2_02D19F980_2_02D19F98
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeCode function: 0_2_02D15F200_2_02D15F20
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeCode function: 0_2_02D1426F0_2_02D1426F
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeCode function: 0_2_02D182180_2_02D18218
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeCode function: 0_2_0698310C0_2_0698310C
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeCode function: 0_2_0698EA800_2_0698EA80
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeCode function: 0_2_0698EA710_2_0698EA71
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeCode function: 0_2_0698CB940_2_0698CB94
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeCode function: 0_2_06C0C3440_2_06C0C344
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeCode function: 0_2_06C040400_2_06C04040
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeCode function: 0_2_06C0403B0_2_06C0403B
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeCode function: 0_2_06C0DF280_2_06C0DF28
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeCode function: 0_2_06C440180_2_06C44018
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeCode function: 0_2_06C4EA770_2_06C4EA77
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeCode function: 0_2_06C4EA780_2_06C4EA78
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeCode function: 0_2_082000400_2_08200040
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeCode function: 0_2_082066A00_2_082066A0
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeCode function: 0_2_08208C000_2_08208C00
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeCode function: 0_2_0820E0F80_2_0820E0F8
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeCode function: 0_2_0820666D0_2_0820666D
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeCode function: 0_2_089530300_2_08953030
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeCode function: 0_2_0895D85C0_2_0895D85C
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeCode function: 0_2_089530170_2_08953017
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeCode function: 10_2_011412A710_2_011412A7
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeCode function: 10_2_01145F2010_2_01145F20
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeCode function: 10_2_011480A010_2_011480A0
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeCode function: 10_2_0114426F10_2_0114426F
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeCode function: 10_2_01146E1010_2_01146E10
            Source: Joe Sandbox ViewDropped File: C:\Program Files (x86)\Google Chrome sandbox.exe.exe 63D2C37FDB370CF6E743BD75E7408F5EDED5BC823A29401EEAFE0BEA921657BB
            Source: K59gVXTgGv.exe, 00000000.00000002.2385923555.00000000010AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs K59gVXTgGv.exe
            Source: K59gVXTgGv.exe, 00000000.00000002.2388229518.0000000003FEA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClient.exe. vs K59gVXTgGv.exe
            Source: K59gVXTgGv.exe, 00000000.00000002.2388229518.0000000003EE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClient.exe. vs K59gVXTgGv.exe
            Source: K59gVXTgGv.exe, 00000000.00000002.2388229518.00000000040D5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMiPro.dll, vs K59gVXTgGv.exe
            Source: K59gVXTgGv.exe, 00000000.00000002.2390410734.0000000006900000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMiPro.dll, vs K59gVXTgGv.exe
            Source: K59gVXTgGv.exe, 00000000.00000000.2013273875.0000000000B72000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamechrome.exe< vs K59gVXTgGv.exe
            Source: K59gVXTgGv.exeBinary or memory string: OriginalFilenamechrome.exe< vs K59gVXTgGv.exe
            Source: K59gVXTgGv.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: 0.2.K59gVXTgGv.exe.2f72050.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
            Source: 0.2.K59gVXTgGv.exe.2f72050.0.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 0.2.K59gVXTgGv.exe.2f72050.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: 0.2.K59gVXTgGv.exe.4015f19.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
            Source: 0.2.K59gVXTgGv.exe.4015f19.4.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 0.2.K59gVXTgGv.exe.4015f19.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: 0.2.K59gVXTgGv.exe.314dc30.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
            Source: 0.2.K59gVXTgGv.exe.314dc30.1.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 0.2.K59gVXTgGv.exe.314dc30.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: 0.2.K59gVXTgGv.exe.3f41529.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
            Source: 0.2.K59gVXTgGv.exe.3f41529.3.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 0.2.K59gVXTgGv.exe.3f41529.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: 0.2.K59gVXTgGv.exe.401f560.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 0.2.K59gVXTgGv.exe.401f560.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
            Source: 0.2.K59gVXTgGv.exe.401f560.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_References_VPN author = ditekSHen, description = Detects executables referencing many VPN software clients. Observed in infosteslers
            Source: 0.2.K59gVXTgGv.exe.401f560.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
            Source: 0.2.K59gVXTgGv.exe.401f560.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_StormKitty author = ditekSHen, description = Detects StormKitty infostealer, clamav_sig = MALWARE.Win.Trojan.StormKitty
            Source: 0.2.K59gVXTgGv.exe.314dc30.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
            Source: 0.2.K59gVXTgGv.exe.314dc30.1.raw.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 0.2.K59gVXTgGv.exe.314dc30.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: 0.2.K59gVXTgGv.exe.3fea2ea.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 0.2.K59gVXTgGv.exe.3fea2ea.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
            Source: 0.2.K59gVXTgGv.exe.3fea2ea.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_References_VPN author = ditekSHen, description = Detects executables referencing many VPN software clients. Observed in infosteslers
            Source: 0.2.K59gVXTgGv.exe.3fea2ea.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
            Source: 0.2.K59gVXTgGv.exe.3fea2ea.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_StormKitty author = ditekSHen, description = Detects StormKitty infostealer, clamav_sig = MALWARE.Win.Trojan.StormKitty
            Source: 0.2.K59gVXTgGv.exe.2f72050.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
            Source: 0.2.K59gVXTgGv.exe.2f72050.0.raw.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 0.2.K59gVXTgGv.exe.2f72050.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: 0.2.K59gVXTgGv.exe.3f158fa.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 0.2.K59gVXTgGv.exe.3f158fa.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
            Source: 0.2.K59gVXTgGv.exe.3f158fa.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_References_VPN author = ditekSHen, description = Detects executables referencing many VPN software clients. Observed in infosteslers
            Source: 0.2.K59gVXTgGv.exe.3f158fa.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
            Source: 0.2.K59gVXTgGv.exe.3f158fa.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_StormKitty author = ditekSHen, description = Detects StormKitty infostealer, clamav_sig = MALWARE.Win.Trojan.StormKitty
            Source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
            Source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_References_VPN author = ditekSHen, description = Detects executables referencing many VPN software clients. Observed in infosteslers
            Source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
            Source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_StormKitty author = ditekSHen, description = Detects StormKitty infostealer, clamav_sig = MALWARE.Win.Trojan.StormKitty
            Source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
            Source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.raw.unpack, type: UNPACKEDPEMatched rule: RAT_njRat date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects njRAT, reference = http://malwareconfig.com/stats/njRat
            Source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.raw.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
            Source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_References_VPN author = ditekSHen, description = Detects executables referencing many VPN software clients. Observed in infosteslers
            Source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
            Source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_StormKitty author = ditekSHen, description = Detects StormKitty infostealer, clamav_sig = MALWARE.Win.Trojan.StormKitty
            Source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: 0.2.K59gVXTgGv.exe.401f560.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 0.2.K59gVXTgGv.exe.401f560.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
            Source: 0.2.K59gVXTgGv.exe.401f560.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_References_VPN author = ditekSHen, description = Detects executables referencing many VPN software clients. Observed in infosteslers
            Source: 0.2.K59gVXTgGv.exe.401f560.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
            Source: 0.2.K59gVXTgGv.exe.401f560.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_StormKitty author = ditekSHen, description = Detects StormKitty infostealer, clamav_sig = MALWARE.Win.Trojan.StormKitty
            Source: 0.2.K59gVXTgGv.exe.4015f19.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
            Source: 0.2.K59gVXTgGv.exe.4015f19.4.raw.unpack, type: UNPACKEDPEMatched rule: RAT_njRat date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects njRAT, reference = http://malwareconfig.com/stats/njRat
            Source: 0.2.K59gVXTgGv.exe.4015f19.4.raw.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 0.2.K59gVXTgGv.exe.4015f19.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 0.2.K59gVXTgGv.exe.4015f19.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
            Source: 0.2.K59gVXTgGv.exe.4015f19.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_References_VPN author = ditekSHen, description = Detects executables referencing many VPN software clients. Observed in infosteslers
            Source: 0.2.K59gVXTgGv.exe.4015f19.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
            Source: 0.2.K59gVXTgGv.exe.4015f19.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_StormKitty author = ditekSHen, description = Detects StormKitty infostealer, clamav_sig = MALWARE.Win.Trojan.StormKitty
            Source: 0.2.K59gVXTgGv.exe.4015f19.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: 0.2.K59gVXTgGv.exe.3f158fa.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
            Source: 0.2.K59gVXTgGv.exe.3f158fa.7.raw.unpack, type: UNPACKEDPEMatched rule: RAT_njRat date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects njRAT, reference = http://malwareconfig.com/stats/njRat
            Source: 0.2.K59gVXTgGv.exe.3f158fa.7.raw.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 0.2.K59gVXTgGv.exe.3f158fa.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 0.2.K59gVXTgGv.exe.3f158fa.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
            Source: 0.2.K59gVXTgGv.exe.3f158fa.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_References_VPN author = ditekSHen, description = Detects executables referencing many VPN software clients. Observed in infosteslers
            Source: 0.2.K59gVXTgGv.exe.3f158fa.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
            Source: 0.2.K59gVXTgGv.exe.3f158fa.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_StormKitty author = ditekSHen, description = Detects StormKitty infostealer, clamav_sig = MALWARE.Win.Trojan.StormKitty
            Source: 0.2.K59gVXTgGv.exe.3f158fa.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: 0.2.K59gVXTgGv.exe.3fea2ea.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
            Source: 0.2.K59gVXTgGv.exe.3fea2ea.2.raw.unpack, type: UNPACKEDPEMatched rule: RAT_njRat date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects njRAT, reference = http://malwareconfig.com/stats/njRat
            Source: 0.2.K59gVXTgGv.exe.3fea2ea.2.raw.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 0.2.K59gVXTgGv.exe.3fea2ea.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 0.2.K59gVXTgGv.exe.3fea2ea.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
            Source: 0.2.K59gVXTgGv.exe.3fea2ea.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_References_VPN author = ditekSHen, description = Detects executables referencing many VPN software clients. Observed in infosteslers
            Source: 0.2.K59gVXTgGv.exe.3fea2ea.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
            Source: 0.2.K59gVXTgGv.exe.3fea2ea.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_StormKitty author = ditekSHen, description = Detects StormKitty infostealer, clamav_sig = MALWARE.Win.Trojan.StormKitty
            Source: 0.2.K59gVXTgGv.exe.3fea2ea.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: 0.2.K59gVXTgGv.exe.3f41529.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
            Source: 0.2.K59gVXTgGv.exe.3f41529.3.raw.unpack, type: UNPACKEDPEMatched rule: RAT_njRat date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects njRAT, reference = http://malwareconfig.com/stats/njRat
            Source: 0.2.K59gVXTgGv.exe.3f41529.3.raw.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 0.2.K59gVXTgGv.exe.3f41529.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 0.2.K59gVXTgGv.exe.3f41529.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
            Source: 0.2.K59gVXTgGv.exe.3f41529.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_References_VPN author = ditekSHen, description = Detects executables referencing many VPN software clients. Observed in infosteslers
            Source: 0.2.K59gVXTgGv.exe.3f41529.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
            Source: 0.2.K59gVXTgGv.exe.3f41529.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_StormKitty author = ditekSHen, description = Detects StormKitty infostealer, clamav_sig = MALWARE.Win.Trojan.StormKitty
            Source: 0.2.K59gVXTgGv.exe.3f41529.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: 00000000.00000002.2386535902.0000000003146000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
            Source: 00000000.00000002.2386535902.0000000003146000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 00000000.00000002.2386535902.0000000002F37000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
            Source: 00000000.00000002.2386535902.0000000002F37000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 00000000.00000002.2388229518.0000000003FEA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
            Source: 00000000.00000002.2388229518.0000000003FEA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: RAT_njRat date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects njRAT, reference = http://malwareconfig.com/stats/njRat
            Source: 00000000.00000002.2388229518.0000000003FEA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 00000000.00000002.2388229518.0000000003FEA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 00000000.00000002.2388229518.0000000003FEA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
            Source: 00000000.00000002.2388229518.0000000003EE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
            Source: 00000000.00000002.2388229518.0000000003EE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: RAT_njRat date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects njRAT, reference = http://malwareconfig.com/stats/njRat
            Source: 00000000.00000002.2388229518.0000000003EE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 00000000.00000002.2388229518.0000000003EE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 00000000.00000002.2388229518.0000000003EE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
            Source: Process Memory Space: K59gVXTgGv.exe PID: 5160, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: Process Memory Space: K59gVXTgGv.exe PID: 5160, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
            Source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.raw.unpack, Settings.csBase64 encoded string: 'OfRC+NypcE+IToheoZZN8pzwcDl4uSi/g7kEwzyZwq8E7oBwdwJagaueIm5JCpPAfrjZ5wzTLIiXc6XMrv+mQnk407lFRkkJ1V3vZycPDJ5XzUVrKJq/ZzaglZwif4nN', 'v7KS4NGYpYR6dbl1ohYtOvZyF3faG8ZOM6yHQQArFUaFpvFmd2QuG8pR6Ea3G0MP2HfuQ241T0FwhKo+d5vVWA==', 'Z5pZYvRJIFTn8wlNIbceeqsxsKyiih9zS9G1Q49QpoEQOhv8FIVYhJy3JtaDzo7YHrinzRvWHLMY6KkdaCxT9w==', 'lv3eVVbrtyehpFQQS+O85pqbqHpE531GsoTORjAIVkmXnn29fizpHaeprUcfXfR7i1rDsUVnA0uHFazCOt353g==', 'vx/BE7jbRUB6mf7JvBe7Aqms5ens79dF75erQeF42sT5vvO+4N9X2zk0aqxqkuguWA/A06An2byEZbqi5N4oc6eDd74t2bt19gesw0UIL8c=', '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', 'xYuvE6ES2q02iyx0gj+TcxpQsqddzdkIJrpkxnhqM1VY6AGnW9K7iueX76+kb51aZY1MQHOImE+WAxBe/9TWW8PghqnYJs+uiWFcbqIrt7wBNgYAZIb4fWIYK6I8PvG
            Source: 0.2.K59gVXTgGv.exe.3fea2ea.2.raw.unpack, Settings.csBase64 encoded string: 'OfRC+NypcE+IToheoZZN8pzwcDl4uSi/g7kEwzyZwq8E7oBwdwJagaueIm5JCpPAfrjZ5wzTLIiXc6XMrv+mQnk407lFRkkJ1V3vZycPDJ5XzUVrKJq/ZzaglZwif4nN', 'v7KS4NGYpYR6dbl1ohYtOvZyF3faG8ZOM6yHQQArFUaFpvFmd2QuG8pR6Ea3G0MP2HfuQ241T0FwhKo+d5vVWA==', 'Z5pZYvRJIFTn8wlNIbceeqsxsKyiih9zS9G1Q49QpoEQOhv8FIVYhJy3JtaDzo7YHrinzRvWHLMY6KkdaCxT9w==', 'lv3eVVbrtyehpFQQS+O85pqbqHpE531GsoTORjAIVkmXnn29fizpHaeprUcfXfR7i1rDsUVnA0uHFazCOt353g==', 'vx/BE7jbRUB6mf7JvBe7Aqms5ens79dF75erQeF42sT5vvO+4N9X2zk0aqxqkuguWA/A06An2byEZbqi5N4oc6eDd74t2bt19gesw0UIL8c=', 'nXKe4oAN0iBYluL0NQNKasuRdPEYHHvoJHBCMT+I7iGe41QiUcLXnSquqUdY5Xs+MVUGLpfUfaHVmqMC/SfaaZX1JoFtVGWwClIrpf8FsiO8IpqEKgM6FNqF0Ognzq1b7tp3rIjM2Aq8StkwWXkHUOYxI8qr8GADLi4Ylq0kgwpIiGkb1z/6p5ujAOACIjgw5x9IhvGtTr+pZgOuq775zWQtOZIwgHiwfn+8HAB7TWqKBA5reeQ+GcSe1AVSSvIwL2m9YqmANxvUV/z6P+tntZK9khBosBwHhOiwRWXG7/WpzOHXHsguz9PsgGj8x6vv563lVxWQAVbkGsiVnDkQDg6utGPUefYXoghcReIUhhO5SZiVt8QiJpJVzlEJFFLSzuPdrYoqneInXeUrZciNHk6Hx/qmc0c/OP8zrIiuTOIjkA4/48e72ZkKUXXjDM9NHJYaFkiW7Wy09F3klKb3gXQb7uQKAQ3myxaI9H4viFDzQ+c6ot/Tt/9sm+I5UXFT4EyPgUXKxHI2gqb+mGyqQkOPuBaH45ePwop7BrYpY/1efw+fAOhY4ManjMs6wjMfCyT+RgVfeAolPHVmFc7THpeFENsGzPu4PaQTk7KcIXPlIOAC8nCCQkJ8Z/VkapUueXmA9ouv8rVUX3RDzPNuYQMj6eQGRGoJaiSi1XnTSB+pFxXuymASnVeMHzS1YJc6S1Fy8xnlzJW7wkSc0EzMjLWBFsM3Hqd3b6QH+6AftKjxmEGRAffkIkZg1kgQascpVqw/SlkjNmcC+8/jbyDIsnjfoUA7PIQ6NaNjAWDQ8QJGwp8fEK5MOILen18Pkqix0uS7isDBkB1ChKdH/cR8LyKqqAvhf24jkqpsdpnndycZXCnmG14YSdhSJD7P54U5ewxu5hWc0WDpXKCJSpKp+Gy3I3bLus4hISrBmvvjsDY5WaJWh4rN+zn3lBsaEVXz0YdEKxHlnUuHD4RTG2YEeg7l4NQmHuxkbkoOBiV/EkTcqVMpsm9VZOkIK44jxyFHyoqVqgnllEW2n6iThOHqhykb1ivXu6OBFYSpXiPeRpYEVBpUMWjvXy2wTmgsSDG43S2ISnly04sL8+POHl7dAZhsvW/Yb9kNVsrSyQzUi4FENeRphe5EQb59noFZbgoVWYsKCEtLnBLTOMUtNywmHbDlomrWnS16Z9wMlfLoBZwDq7q2Z/8FecilNhRqRnip5R1F+C7L5+PkGgbxv7hvDfnKlP68bC41b2+l+8MfkH/OIC4Pf4M4KBF7l5svnS6/SkGqtZ8RNySst5Cz/y7LYkWD8jrSInEMDXNvDkVq5egyR0WF52kgbiLK08K4cGSVG0q7Eo0WyabA8Ez1czK/JmEpDEJ2fggJBNfU8KOpygs/tUwEnJjj+fb+pogdcNDftRu+jLkC232YXIpGdY/sIUc03VXzJPbMwZVCZXmWZepd5FRkB7xBL6Vel/AIR6HMGe8APTLt5mtX7wMzt7tMf/KG7tH20e6uEYu7pmgfFXjU9LksVMIL8YZhezJqFHf+AW70OMfSNkYnu/sPLvlXSRD/7WVGTUjXtDFgTAPWVSLDiCkDi+DZ0aRUDufzdLaKLL0QaIiFxTE7R8TtaHooLbq1YGUnnGCmIzJH9yWg96yCDebbKI4TbcuNBfBpHaQ4nFL0/eu7rIDtbNrlM4pVdH1/kmax+IW7RBa5AH56ZoN8v6ZTK8vGmIX7JDWynYrSqFEetkjXYL9hoVT4TAhayuqAjY3rXtL1Wr+0ixxK+3nnBmEGbv4B5CV6UW1op7x6JljRFVhPGnU7gQdZMhTIlzx9V0r26bfwepof5aI3lQUjqV5nqB2K2M86T57ul4upx+UKts/3cqFm4uW6KGU+QlDJH5X5MpBAzlwDVFqO90gNG1iaO7L+5wB+mCR7GMOHWRvaEGPx7APVOR8Yfp4eJafkkh46BMOLWmuEzIx6XukDk9O7vsW9XMC88CuUsW5yCR+i61dDX2/1vuohT3RYT8mpm9I3h+dZkQYawTD8WPh9v/RihPHhp2PuM1O1s73iF+/DL+NvEn03K5FJ7pN5QdQ+Dh7ZxZ0gCHxC7kXaGz5krfPAZ7jnR61ojVDZyZkDUytVwZqVtNqOgW/kGZVrzkevqyK/ZDvyrRKd1Rr4dUYQxUc0X2tvBIamwGdwTkytiQWQUxkR2u+8P4HB6uPjaMAVvJ4ms7qv2bL9xb4OzTbG0Zk8J2p+N5t9uSrqVYVXn0pLQTZYXDpEbDKIjM4eSXjs9+iR68v+QgfwZfx380SFEkX8USuAGi+nknn2750JpeIa0K2PJLG7REXQxTTndMK8NHumykm63bZKIosdjC8=', 'xYuvE6ES2q02iyx0gj+TcxpQsqddzdkIJrpkxnhqM1VY6AGnW9K7iueX76+kb51aZY1MQHOImE+WAxBe/9TWW8PghqnYJs+uiWFcbqIrt7wBNgYAZIb4fWIYK6I8PvG
            Source: 0.2.K59gVXTgGv.exe.401f560.8.raw.unpack, Settings.csBase64 encoded string: 'OfRC+NypcE+IToheoZZN8pzwcDl4uSi/g7kEwzyZwq8E7oBwdwJagaueIm5JCpPAfrjZ5wzTLIiXc6XMrv+mQnk407lFRkkJ1V3vZycPDJ5XzUVrKJq/ZzaglZwif4nN', 'v7KS4NGYpYR6dbl1ohYtOvZyF3faG8ZOM6yHQQArFUaFpvFmd2QuG8pR6Ea3G0MP2HfuQ241T0FwhKo+d5vVWA==', 'Z5pZYvRJIFTn8wlNIbceeqsxsKyiih9zS9G1Q49QpoEQOhv8FIVYhJy3JtaDzo7YHrinzRvWHLMY6KkdaCxT9w==', 'lv3eVVbrtyehpFQQS+O85pqbqHpE531GsoTORjAIVkmXnn29fizpHaeprUcfXfR7i1rDsUVnA0uHFazCOt353g==', 'vx/BE7jbRUB6mf7JvBe7Aqms5ens79dF75erQeF42sT5vvO+4N9X2zk0aqxqkuguWA/A06An2byEZbqi5N4oc6eDd74t2bt19gesw0UIL8c=', 'nXKe4oAN0iBYluL0NQNKasuRdPEYHHvoJHBCMT+I7iGe41QiUcLXnSquqUdY5Xs+MVUGLpfUfaHVmqMC/SfaaZX1JoFtVGWwClIrpf8FsiO8IpqEKgM6FNqF0Ognzq1b7tp3rIjM2Aq8StkwWXkHUOYxI8qr8GADLi4Ylq0kgwpIiGkb1z/6p5ujAOACIjgw5x9IhvGtTr+pZgOuq775zWQtOZIwgHiwfn+8HAB7TWqKBA5reeQ+GcSe1AVSSvIwL2m9YqmANxvUV/z6P+tntZK9khBosBwHhOiwRWXG7/WpzOHXHsguz9PsgGj8x6vv563lVxWQAVbkGsiVnDkQDg6utGPUefYXoghcReIUhhO5SZiVt8QiJpJVzlEJFFLSzuPdrYoqneInXeUrZciNHk6Hx/qmc0c/OP8zrIiuTOIjkA4/48e72ZkKUXXjDM9NHJYaFkiW7Wy09F3klKb3gXQb7uQKAQ3myxaI9H4viFDzQ+c6ot/Tt/9sm+I5UXFT4EyPgUXKxHI2gqb+mGyqQkOPuBaH45ePwop7BrYpY/1efw+fAOhY4ManjMs6wjMfCyT+RgVfeAolPHVmFc7THpeFENsGzPu4PaQTk7KcIXPlIOAC8nCCQkJ8Z/VkapUueXmA9ouv8rVUX3RDzPNuYQMj6eQGRGoJaiSi1XnTSB+pFxXuymASnVeMHzS1YJc6S1Fy8xnlzJW7wkSc0EzMjLWBFsM3Hqd3b6QH+6AftKjxmEGRAffkIkZg1kgQascpVqw/SlkjNmcC+8/jbyDIsnjfoUA7PIQ6NaNjAWDQ8QJGwp8fEK5MOILen18Pkqix0uS7isDBkB1ChKdH/cR8LyKqqAvhf24jkqpsdpnndycZXCnmG14YSdhSJD7P54U5ewxu5hWc0WDpXKCJSpKp+Gy3I3bLus4hISrBmvvjsDY5WaJWh4rN+zn3lBsaEVXz0YdEKxHlnUuHD4RTG2YEeg7l4NQmHuxkbkoOBiV/EkTcqVMpsm9VZOkIK44jxyFHyoqVqgnllEW2n6iThOHqhykb1ivXu6OBFYSpXiPeRpYEVBpUMWjvXy2wTmgsSDG43S2ISnly04sL8+POHl7dAZhsvW/Yb9kNVsrSyQzUi4FENeRphe5EQb59noFZbgoVWYsKCEtLnBLTOMUtNywmHbDlomrWnS16Z9wMlfLoBZwDq7q2Z/8FecilNhRqRnip5R1F+C7L5+PkGgbxv7hvDfnKlP68bC41b2+l+8MfkH/OIC4Pf4M4KBF7l5svnS6/SkGqtZ8RNySst5Cz/y7LYkWD8jrSInEMDXNvDkVq5egyR0WF52kgbiLK08K4cGSVG0q7Eo0WyabA8Ez1czK/JmEpDEJ2fggJBNfU8KOpygs/tUwEnJjj+fb+pogdcNDftRu+jLkC232YXIpGdY/sIUc03VXzJPbMwZVCZXmWZepd5FRkB7xBL6Vel/AIR6HMGe8APTLt5mtX7wMzt7tMf/KG7tH20e6uEYu7pmgfFXjU9LksVMIL8YZhezJqFHf+AW70OMfSNkYnu/sPLvlXSRD/7WVGTUjXtDFgTAPWVSLDiCkDi+DZ0aRUDufzdLaKLL0QaIiFxTE7R8TtaHooLbq1YGUnnGCmIzJH9yWg96yCDebbKI4TbcuNBfBpHaQ4nFL0/eu7rIDtbNrlM4pVdH1/kmax+IW7RBa5AH56ZoN8v6ZTK8vGmIX7JDWynYrSqFEetkjXYL9hoVT4TAhayuqAjY3rXtL1Wr+0ixxK+3nnBmEGbv4B5CV6UW1op7x6JljRFVhPGnU7gQdZMhTIlzx9V0r26bfwepof5aI3lQUjqV5nqB2K2M86T57ul4upx+UKts/3cqFm4uW6KGU+QlDJH5X5MpBAzlwDVFqO90gNG1iaO7L+5wB+mCR7GMOHWRvaEGPx7APVOR8Yfp4eJafkkh46BMOLWmuEzIx6XukDk9O7vsW9XMC88CuUsW5yCR+i61dDX2/1vuohT3RYT8mpm9I3h+dZkQYawTD8WPh9v/RihPHhp2PuM1O1s73iF+/DL+NvEn03K5FJ7pN5QdQ+Dh7ZxZ0gCHxC7kXaGz5krfPAZ7jnR61ojVDZyZkDUytVwZqVtNqOgW/kGZVrzkevqyK/ZDvyrRKd1Rr4dUYQxUc0X2tvBIamwGdwTkytiQWQUxkR2u+8P4HB6uPjaMAVvJ4ms7qv2bL9xb4OzTbG0Zk8J2p+N5t9uSrqVYVXn0pLQTZYXDpEbDKIjM4eSXjs9+iR68v+QgfwZfx380SFEkX8USuAGi+nknn2750JpeIa0K2PJLG7REXQxTTndMK8NHumykm63bZKIosdjC8=', 'xYuvE6ES2q02iyx0gj+TcxpQsqddzdkIJrpkxnhqM1VY6AGnW9K7iueX76+kb51aZY1MQHOImE+WAxBe/9TWW8PghqnYJs+uiWFcbqIrt7wBNgYAZIb4fWIYK6I8PvG
            Source: 0.2.K59gVXTgGv.exe.3f158fa.7.raw.unpack, Settings.csBase64 encoded string: 'OfRC+NypcE+IToheoZZN8pzwcDl4uSi/g7kEwzyZwq8E7oBwdwJagaueIm5JCpPAfrjZ5wzTLIiXc6XMrv+mQnk407lFRkkJ1V3vZycPDJ5XzUVrKJq/ZzaglZwif4nN', 'v7KS4NGYpYR6dbl1ohYtOvZyF3faG8ZOM6yHQQArFUaFpvFmd2QuG8pR6Ea3G0MP2HfuQ241T0FwhKo+d5vVWA==', 'Z5pZYvRJIFTn8wlNIbceeqsxsKyiih9zS9G1Q49QpoEQOhv8FIVYhJy3JtaDzo7YHrinzRvWHLMY6KkdaCxT9w==', 'lv3eVVbrtyehpFQQS+O85pqbqHpE531GsoTORjAIVkmXnn29fizpHaeprUcfXfR7i1rDsUVnA0uHFazCOt353g==', 'vx/BE7jbRUB6mf7JvBe7Aqms5ens79dF75erQeF42sT5vvO+4N9X2zk0aqxqkuguWA/A06An2byEZbqi5N4oc6eDd74t2bt19gesw0UIL8c=', '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', 'xYuvE6ES2q02iyx0gj+TcxpQsqddzdkIJrpkxnhqM1VY6AGnW9K7iueX76+kb51aZY1MQHOImE+WAxBe/9TWW8PghqnYJs+uiWFcbqIrt7wBNgYAZIb4fWIYK6I8PvG
            Source: 0.2.K59gVXTgGv.exe.3fea2ea.2.raw.unpack, Methods.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 0.2.K59gVXTgGv.exe.3fea2ea.2.raw.unpack, Methods.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.raw.unpack, Methods.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.raw.unpack, Methods.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 0.2.K59gVXTgGv.exe.3f158fa.7.raw.unpack, Methods.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 0.2.K59gVXTgGv.exe.3f158fa.7.raw.unpack, Methods.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 0.2.K59gVXTgGv.exe.401f560.8.raw.unpack, Methods.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 0.2.K59gVXTgGv.exe.401f560.8.raw.unpack, Methods.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@10/6@1/2
            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Program Files (x86)\Google Chrome sandbox.exe.exeJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Google Chrome sandbox.exe.lnkJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeMutant created: NULL
            Source: K59gVXTgGv.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: K59gVXTgGv.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeFile read: C:\Program Files (x86)\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: K59gVXTgGv.exeReversingLabs: Detection: 67%
            Source: K59gVXTgGv.exeVirustotal: Detection: 64%
            Source: unknownProcess created: C:\Users\user\Desktop\K59gVXTgGv.exe "C:\Users\user\Desktop\K59gVXTgGv.exe"
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd" /c ping 127.0.0.1 -n 43 > nul && copy "C:\Users\user\Desktop\K59gVXTgGv.exe" "C:\Program Files (x86)\Google Chrome sandbox.exe.exe" && ping 127.0.0.1 -n 43 > nul && "C:\Program Files (x86)\Google Chrome sandbox.exe.exe"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 43
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 43
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files (x86)\Google Chrome sandbox.exe.exe "C:\Program Files (x86)\Google Chrome sandbox.exe.exe"
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd" /c ping 127.0.0.1 -n 43 > nul && copy "C:\Users\user\Desktop\K59gVXTgGv.exe" "C:\Program Files (x86)\Google Chrome sandbox.exe.exe" && ping 127.0.0.1 -n 43 > nul && "C:\Program Files (x86)\Google Chrome sandbox.exe.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 43Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 43Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files (x86)\Google Chrome sandbox.exe.exe "C:\Program Files (x86)\Google Chrome sandbox.exe.exe"Jump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeSection loaded: dwrite.dllJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeSection loaded: windowscodecs.dllJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeSection loaded: sxs.dllJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeSection loaded: scrrun.dllJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\SysWOW64\PING.EXESection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\PING.EXESection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\PING.EXESection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\SysWOW64\PING.EXESection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\PING.EXESection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\PING.EXESection loaded: mswsock.dllJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeSection loaded: version.dllJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
            Source: Google Chrome sandbox.exe.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files (x86)\Google Chrome sandbox.exe.exe
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: K59gVXTgGv.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: K59gVXTgGv.exeStatic file information: File size 1735048 > 1048576
            Source: K59gVXTgGv.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Data Obfuscation

            barindex
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.2f72050.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.4015f19.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.6900000.9.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.314dc30.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f41529.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.40d5ef0.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.6900000.9.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.314dc30.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.40d5ef0.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.2f72050.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.4015f19.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f158fa.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3fea2ea.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f41529.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.2386535902.0000000003146000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2390410734.0000000006900000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2388229518.00000000040D5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2386535902.0000000002F37000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2386535902.0000000002E6F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2388229518.0000000003FEA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2388229518.0000000003EE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: K59gVXTgGv.exe PID: 5160, type: MEMORYSTR
            Source: K59gVXTgGv.exe, Ca3t4Y.cs.Net Code: NewLateBinding.LateCall(objectValue, (Type)null, "Invoke", new object[2]{null,new object[0]}, (string[])null, (Type[])null, (bool[])null, true)
            Source: Google Chrome sandbox.exe.exe.4.dr, Ca3t4Y.cs.Net Code: NewLateBinding.LateCall(objectValue, (Type)null, "Invoke", new object[2]{null,new object[0]}, (string[])null, (Type[])null, (bool[])null, true)
            Source: K59gVXTgGv.exe, Ca3t4Y.cs.Net Code: r2K6W System.Reflection.Assembly.Load(byte[])
            Source: 0.2.K59gVXTgGv.exe.2f72050.0.raw.unpack, OK.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
            Source: 0.2.K59gVXTgGv.exe.314dc30.1.raw.unpack, OK.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
            Source: 0.2.K59gVXTgGv.exe.4015f19.4.raw.unpack, OK.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
            Source: 0.2.K59gVXTgGv.exe.3f41529.3.raw.unpack, OK.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
            Source: Google Chrome sandbox.exe.exe.4.dr, Ca3t4Y.cs.Net Code: r2K6W System.Reflection.Assembly.Load(byte[])
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeCode function: 0_2_02D19B80 pushad ; retf 0_2_02D19BF1
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeCode function: 0_2_06987990 pushad ; ret 0_2_06987991
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeCode function: 0_2_06987992 push eax; ret 0_2_06987999
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeCode function: 0_2_06AD45F0 push eax; iretd 0_2_06AD45FD
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeCode function: 0_2_06AD8F30 push es; ret 0_2_06AD8F50
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeCode function: 0_2_06AD73A0 push es; ret 0_2_06AD73B0
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeCode function: 0_2_06AD3390 push es; ret 0_2_06AD33A0
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeCode function: 0_2_06ADF80C pushfd ; retf 0_2_06ADF80D
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeCode function: 0_2_06ADF855 pushfd ; retf 0_2_06ADF856
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeCode function: 0_2_06C0A608 pushfd ; retf 0_2_06C0A609
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeCode function: 0_2_06C0A5DC pushfd ; retf 0_2_06C0A5DD
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeCode function: 0_2_06C02F0B push es; ret 0_2_06C02F16
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeCode function: 0_2_06C009F3 pushfd ; iretd 0_2_06C009F5
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeCode function: 0_2_06C4FF80 pushfd ; retf 0_2_06C4FF81
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeCode function: 0_2_06C41F59 push es; ret 0_2_06C41F60
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeCode function: 0_2_0820C040 push es; ret 0_2_0820C07A
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeCode function: 0_2_0820F21D push FFFFFF8Bh; iretd 0_2_0820F21F
            Source: K59gVXTgGv.exeStatic PE information: section name: .text entropy: 6.961855800562577
            Source: Google Chrome sandbox.exe.exe.4.drStatic PE information: section name: .text entropy: 6.961855800562577
            Source: K59gVXTgGv.exe, Em62.csHigh entropy of concatenated method names: 'Mo7w3J', 'g8BXb5', 'g0LSe8', 'm6X8Wr', 'Mc1z8E', 'Ci35Qw', 'Zg2j1H', 'mciSendStringW', 'XInputGetState', 'XInputSetState'
            Source: Google Chrome sandbox.exe.exe.4.dr, Em62.csHigh entropy of concatenated method names: 'Mo7w3J', 'g8BXb5', 'g0LSe8', 'm6X8Wr', 'Mc1z8E', 'Ci35Qw', 'Zg2j1H', 'mciSendStringW', 'XInputGetState', 'XInputSetState'
            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Program Files (x86)\Google Chrome sandbox.exe.exeJump to dropped file
            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Program Files (x86)\Google Chrome sandbox.exe.exeJump to dropped file

            Boot Survival

            barindex
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.401f560.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3fea2ea.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f158fa.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.401f560.8.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.4015f19.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f158fa.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3fea2ea.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f41529.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.2388229518.0000000003FEA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2388229518.0000000003EE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: K59gVXTgGv.exe PID: 5160, type: MEMORYSTR
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Google Chrome sandbox.exe.lnkJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Google Chrome sandbox.exe.lnkJump to behavior

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeFile opened: C:\Users\user\Desktop\K59gVXTgGv.exe\:Zone.Identifier read attributes | deleteJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.314dc30.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.2f72050.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.2386535902.0000000003146000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2386535902.0000000002F37000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: K59gVXTgGv.exe PID: 5160, type: MEMORYSTR
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.401f560.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3fea2ea.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f158fa.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.401f560.8.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.4015f19.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f158fa.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3fea2ea.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f41529.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.2388229518.0000000003FEA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2388229518.0000000003EE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: K59gVXTgGv.exe PID: 5160, type: MEMORYSTR
            Source: K59gVXTgGv.exe, 00000000.00000002.2388229518.0000000003FEA000.00000004.00000800.00020000.00000000.sdmp, K59gVXTgGv.exe, 00000000.00000002.2388229518.0000000003EE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 43
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 43
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 43Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 43Jump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeMemory allocated: 2CD0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeMemory allocated: 2E40000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeMemory allocated: 4E40000 memory reserve | memory write watchJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeMemory allocated: 1140000 memory reserve | memory write watchJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeMemory allocated: 2AE0000 memory reserve | memory write watchJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeMemory allocated: 4AE0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeWindow / User API: threadDelayed 8312Jump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeWindow / User API: threadDelayed 1532Jump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exe TID: 2860Thread sleep time: -32281802128991695s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exe TID: 2860Thread sleep time: -30000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\PING.EXE TID: 6204Thread sleep count: 41 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\PING.EXE TID: 6204Thread sleep time: -41000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\PING.EXE TID: 4140Thread sleep count: 41 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\PING.EXE TID: 4140Thread sleep time: -41000s >= -30000sJump to behavior
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeThread delayed: delay time: 30000Jump to behavior
            Source: K59gVXTgGv.exe, 00000000.00000002.2391605294.0000000007F85000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}#G
            Source: K59gVXTgGv.exe, 00000000.00000002.2388229518.00000000040D5000.00000004.00000800.00020000.00000000.sdmp, K59gVXTgGv.exe, 00000000.00000002.2390410734.0000000006900000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: VBoxTray
            Source: K59gVXTgGv.exe, 00000000.00000002.2390346304.00000000067B8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
            Source: K59gVXTgGv.exe, 00000000.00000002.2388229518.0000000003EE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
            Source: K59gVXTgGv.exe, 00000000.00000002.2390410734.0000000006900000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: sandboxierpcssGSOFTWARE\VMware, Inc.\VMware VGAuth
            Source: K59gVXTgGv.exe, 00000000.00000002.2388229518.0000000003EE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMwareVBox
            Source: K59gVXTgGv.exe, 00000000.00000002.2385923555.00000000010E2000.00000004.00000020.00020000.00000000.sdmp, Google Chrome sandbox.exe.exe, 0000000A.00000002.3261484937.0000000000F69000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.raw.unpack, Keylogger.csReference to suspicious API methods: MapVirtualKey(vkCode, 0u)
            Source: 0.2.K59gVXTgGv.exe.2f72050.0.raw.unpack, kl.csReference to suspicious API methods: GetAsyncKeyState(num2)
            Source: 0.2.K59gVXTgGv.exe.2f72050.0.raw.unpack, OK.csReference to suspicious API methods: capGetDriverDescriptionA(wDriver, ref lpszName, 100, ref lpszVer, 100)
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd" /c ping 127.0.0.1 -n 43 > nul && copy "C:\Users\user\Desktop\K59gVXTgGv.exe" "C:\Program Files (x86)\Google Chrome sandbox.exe.exe" && ping 127.0.0.1 -n 43 > nul && "C:\Program Files (x86)\Google Chrome sandbox.exe.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 43Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 43Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files (x86)\Google Chrome sandbox.exe.exe "C:\Program Files (x86)\Google Chrome sandbox.exe.exe"Jump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeQueries volume information: C:\Users\user\Desktop\K59gVXTgGv.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeQueries volume information: C:\Program Files (x86)\Google Chrome sandbox.exe.exe VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Google Chrome sandbox.exe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\K59gVXTgGv.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Lowering of HIPS / PFW / Operating System Security Settings

            barindex
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.401f560.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3fea2ea.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f158fa.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.401f560.8.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.4015f19.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f158fa.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3fea2ea.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f41529.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.2388229518.0000000003FEA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2388229518.0000000003EE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: K59gVXTgGv.exe PID: 5160, type: MEMORYSTR

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.2f72050.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.4015f19.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.314dc30.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f41529.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.314dc30.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.2f72050.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.4015f19.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f158fa.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3fea2ea.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f41529.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.2386535902.0000000003146000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2386535902.0000000002F37000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2388229518.0000000003FEA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2388229518.0000000003EE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: K59gVXTgGv.exe PID: 5160, type: MEMORYSTR
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.401f560.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3fea2ea.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f158fa.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.401f560.8.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.4015f19.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f158fa.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3fea2ea.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f41529.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.2388229518.0000000003FEA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2388229518.0000000003EE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: K59gVXTgGv.exe PID: 5160, type: MEMORYSTR
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.401f560.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3fea2ea.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f158fa.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.401f560.8.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.4015f19.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f158fa.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3fea2ea.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f41529.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.2388229518.0000000003FEA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2388229518.0000000003EE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: K59gVXTgGv.exe PID: 5160, type: MEMORYSTR
            Source: K59gVXTgGv.exe, 00000000.00000002.2388229518.0000000003FEA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Electrum#\Electrum\wallets
            Source: K59gVXTgGv.exe, 00000000.00000002.2388229518.0000000003FEA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: \bytecoinJaxxk\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb
            Source: K59gVXTgGv.exe, 00000000.00000002.2388229518.0000000003FEA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Exodus+\Exodus\exodus.wallet
            Source: K59gVXTgGv.exe, 00000000.00000002.2388229518.0000000003FEA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Ethereum%\Ethereum\keystore
            Source: K59gVXTgGv.exe, 00000000.00000002.2388229518.0000000003FEA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Exodus+\Exodus\exodus.wallet
            Source: K59gVXTgGv.exe, 00000000.00000002.2388229518.0000000003FEA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Ethereum%\Ethereum\keystore
            Source: K59gVXTgGv.exe, 00000000.00000002.2388229518.0000000003FEA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Coinomi1\Coinomi\Coinomi\wallets
            Source: K59gVXTgGv.exe, 00000000.00000002.2388229518.0000000003FEA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Ethereum%\Ethereum\keystore
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.401f560.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3fea2ea.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f158fa.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.401f560.8.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.4015f19.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f158fa.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3fea2ea.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f41529.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.2388229518.0000000003FEA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2388229518.0000000003EE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: K59gVXTgGv.exe PID: 5160, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.2f72050.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.4015f19.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.314dc30.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f41529.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.314dc30.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.2f72050.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.4015f19.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f158fa.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3fea2ea.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f41529.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.2386535902.0000000003146000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2386535902.0000000002F37000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2388229518.0000000003FEA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2388229518.0000000003EE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: K59gVXTgGv.exe PID: 5160, type: MEMORYSTR
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.401f560.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3fea2ea.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f158fa.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.401f560.8.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.4015f19.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f158fa.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3fea2ea.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f41529.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.2388229518.0000000003FEA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2388229518.0000000003EE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: K59gVXTgGv.exe PID: 5160, type: MEMORYSTR
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.401f560.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3fea2ea.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f158fa.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f4ab8a.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.401f560.8.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.4015f19.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f158fa.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3fea2ea.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.K59gVXTgGv.exe.3f41529.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.2388229518.0000000003FEA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2388229518.0000000003EE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: K59gVXTgGv.exe PID: 5160, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire Infrastructure1
            Replication Through Removable Media
            1
            Native API
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            1
            Disable or Modify Tools
            1
            Input Capture
            1
            Peripheral Device Discovery
            Remote Services1
            Archive Collected Data
            1
            Ingress Tool Transfer
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts1
            Scheduled Task/Job
            1
            Scheduled Task/Job
            11
            Process Injection
            131
            Obfuscated Files or Information
            LSASS Memory1
            File and Directory Discovery
            Remote Desktop Protocol1
            Data from Local System
            1
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAt2
            Registry Run Keys / Startup Folder
            1
            Scheduled Task/Job
            21
            Software Packing
            Security Account Manager12
            System Information Discovery
            SMB/Windows Admin Shares1
            Screen Capture
            2
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook2
            Registry Run Keys / Startup Folder
            1
            DLL Side-Loading
            NTDS21
            Security Software Discovery
            Distributed Component Object Model1
            Input Capture
            12
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script12
            Masquerading
            LSA Secrets1
            Process Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts31
            Virtualization/Sandbox Evasion
            Cached Domain Credentials31
            Virtualization/Sandbox Evasion
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
            Process Injection
            DCSync1
            Application Window Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
            Hidden Files and Directories
            Proc Filesystem1
            Remote System Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
            System Network Configuration Discovery
            Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1465048 Sample: K59gVXTgGv.exe Startdate: 01/07/2024 Architecture: WINDOWS Score: 100 34 www.google.com 2->34 38 Found malware configuration 2->38 40 Malicious sample detected (through community Yara rule) 2->40 42 Antivirus detection for dropped file 2->42 44 20 other signatures 2->44 8 K59gVXTgGv.exe 14 5 2->8         started        signatures3 process4 dnsIp5 36 www.google.com 142.250.185.164, 49705, 49718, 80 GOOGLEUS United States 8->36 26 C:\Users\user\AppData\...\K59gVXTgGv.exe.log, ASCII 8->26 dropped 46 Found many strings related to Crypto-Wallets (likely being stolen) 8->46 48 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 8->48 50 Hides that the sample has been downloaded from the Internet (zone.identifier) 8->50 52 Queries Google from non browser process on port 80 8->52 13 cmd.exe 3 8->13         started        file6 signatures7 process8 file9 28 C:\...behaviorgraphoogle Chrome sandbox.exe.exe, PE32 13->28 dropped 30 Google Chrome sand...exe:Zone.Identifier, ASCII 13->30 dropped 54 Uses ping.exe to sleep 13->54 56 Uses ping.exe to check the status of other devices and networks 13->56 17 PING.EXE 1 13->17         started        20 Google Chrome sandbox.exe.exe 14 2 13->20         started        22 conhost.exe 13->22         started        24 PING.EXE 1 13->24         started        signatures10 process11 dnsIp12 32 127.0.0.1 unknown unknown 17->32

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            K59gVXTgGv.exe68%ReversingLabsWin32.Trojan.SnakeKeylogger
            K59gVXTgGv.exe65%VirustotalBrowse
            K59gVXTgGv.exe100%AviraHEUR/AGEN.1304596
            K59gVXTgGv.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Program Files (x86)\Google Chrome sandbox.exe.exe100%AviraHEUR/AGEN.1304596
            C:\Program Files (x86)\Google Chrome sandbox.exe.exe100%Joe Sandbox ML
            C:\Program Files (x86)\Google Chrome sandbox.exe.exe68%ReversingLabsWin32.Trojan.SnakeKeylogger
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
            https://api.telegram.org/file/bot0%Avira URL Cloudsafe
            http://www.google.com0%Avira URL Cloudsafe
            https://dl.dropbox.com/s/p84aaz28t0hepul/Pass.exe?dl=00%Avira URL Cloudsafe
            https://raw.githubusercontent.com/LimerBoy/StormKitty/master/StormKitty/stub/packages/DotNetZip.1.130%Avira URL Cloudsafe
            https://github.com/LimerBoy/StormKitty0%Avira URL Cloudsafe
            https://api.telegram.org/bot0%Avira URL Cloudsafe
            194.26.192.920%Avira URL Cloudsafe
            https://csp.withgoogle.com/csp/gws/other-hp0%Avira URL Cloudsafe
            https://pastebin.com/raw/7B75u64B0%Avira URL Cloudsafe
            http://www.google.com/0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            www.google.com
            142.250.185.164
            truefalse
              unknown
              NameMaliciousAntivirus DetectionReputation
              194.26.192.92true
              • Avira URL Cloud: safe
              unknown
              http://www.google.com/false
              • Avira URL Cloud: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://www.google.comK59gVXTgGv.exe, Google Chrome sandbox.exe.exe.4.drfalse
              • Avira URL Cloud: safe
              unknown
              https://dl.dropbox.com/s/p84aaz28t0hepul/Pass.exe?dl=0K59gVXTgGv.exe, 00000000.00000002.2386535902.0000000003146000.00000004.00000800.00020000.00000000.sdmp, K59gVXTgGv.exe, 00000000.00000002.2388229518.0000000003FEA000.00000004.00000800.00020000.00000000.sdmp, K59gVXTgGv.exe, 00000000.00000002.2388229518.0000000003EE0000.00000004.00000800.00020000.00000000.sdmp, K59gVXTgGv.exe, 00000000.00000002.2386535902.0000000002F37000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://raw.githubusercontent.com/LimerBoy/StormKitty/master/StormKitty/stub/packages/DotNetZip.1.13K59gVXTgGv.exe, 00000000.00000002.2388229518.0000000003FEA000.00000004.00000800.00020000.00000000.sdmp, K59gVXTgGv.exe, 00000000.00000002.2388229518.0000000003EE0000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://api.telegram.org/file/botK59gVXTgGv.exe, 00000000.00000002.2388229518.0000000003FEA000.00000004.00000800.00020000.00000000.sdmp, K59gVXTgGv.exe, 00000000.00000002.2388229518.0000000003EE0000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://api.telegram.org/botK59gVXTgGv.exe, 00000000.00000002.2388229518.0000000003EE0000.00000004.00000800.00020000.00000000.sdmptrue
              • Avira URL Cloud: safe
              unknown
              https://github.com/LimerBoy/StormKittyK59gVXTgGv.exe, 00000000.00000002.2388229518.0000000003FEA000.00000004.00000800.00020000.00000000.sdmp, K59gVXTgGv.exe, 00000000.00000002.2388229518.0000000003EE0000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameK59gVXTgGv.exe, 00000000.00000002.2386535902.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, Google Chrome sandbox.exe.exe, 0000000A.00000002.3262432650.0000000002AE1000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://csp.withgoogle.com/csp/gws/other-hpK59gVXTgGv.exe, 00000000.00000002.2386535902.0000000002E6F000.00000004.00000800.00020000.00000000.sdmp, Google Chrome sandbox.exe.exe, 0000000A.00000002.3262432650.0000000002B0F000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://pastebin.com/raw/7B75u64BK59gVXTgGv.exe, 00000000.00000002.2388229518.0000000003FEA000.00000004.00000800.00020000.00000000.sdmp, K59gVXTgGv.exe, 00000000.00000002.2388229518.0000000003EE0000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              142.250.185.164
              www.google.comUnited States
              15169GOOGLEUSfalse
              IP
              127.0.0.1
              Joe Sandbox version:40.0.0 Tourmaline
              Analysis ID:1465048
              Start date and time:2024-07-01 08:26:08 +02:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 6m 42s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:11
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:K59gVXTgGv.exe
              renamed because original name is a hash value
              Original Sample Name:b7ca45674c6b8a24a6a71315e0e51397.exe
              Detection:MAL
              Classification:mal100.troj.spyw.evad.winEXE@10/6@1/2
              EGA Information:
              • Successful, ratio: 50%
              HCA Information:
              • Successful, ratio: 97%
              • Number of executed functions: 201
              • Number of non-executed functions: 12
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
              • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
              • Execution Graph export aborted for target Google Chrome sandbox.exe.exe, PID 2364 because it is empty
              • Not all processes where analyzed, report is missing behavior information
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtProtectVirtualMemory calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              • Report size getting too big, too many NtReadVirtualMemory calls found.
              • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
              TimeTypeDescription
              02:27:04API Interceptor222x Sleep call for process: K59gVXTgGv.exe modified
              02:28:07API Interceptor20x Sleep call for process: PING.EXE modified
              08:27:09AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Google Chrome sandbox.exe.lnk
              No context
              No context
              No context
              No context
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              C:\Program Files (x86)\Google Chrome sandbox.exe.exeSUimFrNB4N.exeGet hashmaliciousLummaC, AsyncRAT, DarkTortilla, Njrat, SmokeLoader, StormKittyBrowse
                qoe1X4ig0N.exeGet hashmaliciousLummaC, AsyncRAT, DarkTortilla, LummaC Stealer, Njrat, SmokeLoader, StormKittyBrowse
                  Process:C:\Windows\SysWOW64\cmd.exe
                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                  Category:dropped
                  Size (bytes):1735048
                  Entropy (8bit):6.632933062634782
                  Encrypted:false
                  SSDEEP:24576:iRJSuMgl+JTBJ5aB3KoWWbHcXThtehTl5O9TLb:0IEFd/CTqR8P
                  MD5:B7CA45674C6B8A24A6A71315E0E51397
                  SHA1:79516B1BD2227F08FF333B950DAFB29707916828
                  SHA-256:63D2C37FDB370CF6E743BD75E7408F5EDED5BC823A29401EEAFE0BEA921657BB
                  SHA-512:F390C2D017C041B60C57A67508341512785EFBD25CB93A5C2849B4A5ADB52931EA92ECA7BBBEF3E0CAE0C919525770582E4C5E2518033C1C61542C0C2C1EBF2F
                  Malicious:true
                  Antivirus:
                  • Antivirus: Avira, Detection: 100%
                  • Antivirus: Joe Sandbox ML, Detection: 100%
                  • Antivirus: ReversingLabs, Detection: 68%
                  Joe Sandbox View:
                  • Filename: SUimFrNB4N.exe, Detection: malicious, Browse
                  • Filename: qoe1X4ig0N.exe, Detection: malicious, Browse
                  Reputation:low
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...g..d..............P......@........... ... ....@.. ....................................`.....................................O.... ..p=...........6...C...`....................................................... ............... ..H............text...4.... ...................... ..`.rsrc...p=... ...>..................@..@.reloc.......`.......4..............@..B........................H.......\w..............H.....................................................+>.~.>...?..*?}?U?...?&.{ ...+.*"..} ...*&.{!...+.*"..}!...*&.{"...+.*"..}"...*&.{#...+.*"..}#...*&.{$...+.*"..}$...*..(%.....} .....}!.....}"......}#......}$...*..('...*&..((....*.s)........s*........s+........s,........s-........*Z........o@...........*&..(%....*j..{....(...+}.....{....+.*...{......,.+.....,.r...psE...z..|....(...+*&........*".......*Vs+...(J...t.........*..(K...*&..(.....*B..(6..
                  Process:C:\Windows\SysWOW64\cmd.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:modified
                  Size (bytes):26
                  Entropy (8bit):3.95006375643621
                  Encrypted:false
                  SSDEEP:3:ggPYV:rPYV
                  MD5:187F488E27DB4AF347237FE461A079AD
                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                  Malicious:true
                  Reputation:high, very likely benign file
                  Preview:[ZoneTransfer]....ZoneId=0
                  Process:C:\Users\user\Desktop\K59gVXTgGv.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):1216
                  Entropy (8bit):5.34331486778365
                  Encrypted:false
                  SSDEEP:24:MLV1qE4x84qpE4KlKDE4KhKiKhIE4KnKIE4oKNzKoZAE4Kze0E4j:Mp1qHxv2HKlYHKh3oIHKntHo6hAHKzea
                  MD5:8275047EA04782E18195CE5F2F076225
                  SHA1:86FE553781E50EE2493A6D54A2F329FF94AD0DEE
                  SHA-256:302DE184C80A778557AA7F09DDCAB59FED5712B6BC617FDEAFE1E004021FFDDC
                  SHA-512:4F7B9BE379C98D5E9609D46FC0B473C66A977C3A081C60872CB8FE344C2785A285E9D9019D49515A6DC5D1E6EFF2D8DD5E5BA49086AF24F8A2F50E6B9EBE588B
                  Malicious:true
                  Reputation:low
                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                  Process:C:\Users\user\Desktop\K59gVXTgGv.exe
                  File Type:MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
                  Category:dropped
                  Size (bytes):860
                  Entropy (8bit):3.5179406048799224
                  Encrypted:false
                  SSDEEP:12:8wl0M0a/ledp86dUi0n8bdpYiQ+0n60bdpYiQ+0nHgQ/CNUvH4t2YZ/elFlSJm:8gudO6Z0IdRZ06gdRZ0HXOUFqy
                  MD5:048DC386A4ED2A90A325DD7716549C15
                  SHA1:DF972080CACAF37BB956B468A7485262D067A123
                  SHA-256:C83EE8BF1732C9986BAE37F6EBD13B21A194F7531267A403AFF361B8AF8ACB50
                  SHA-512:FF9989E974D633ABABF2B96A14A53FFFBA5293C7EEAA2CFA5CCEE37CC3B065DC5A136CFD0956011266ED1CACA653E3703A775A164B593270B381DD6537E4F5A7
                  Malicious:false
                  Preview:L..................F........................................................A....P.O. .:i.....+00.../C:\...................z.1...........Program Files (x86).X............................................P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)..."...2...........Google Chrome sandbox.exe.exe.l............................................G.o.o.g.l.e. .C.h.r.o.m.e. .s.a.n.d.b.o.x...e.x.e...e.x.e...,...L.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.G.o.o.g.l.e. .C.h.r.o.m.e. .s.a.n.d.b.o.x...e.x.e...e.x.e.4.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.G.o.o.g.l.e. .C.h.r.o.m.e. .s.a.n.d.b.o.x...e.x.e...e.x.e.........*................@Z|...K.J.....................1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.2.2.4.6.1.2.2.6.5.8.-.3.6.9.3.4.0.5.1.1.7.-.2.4.7.6.7.5.6.6.3.4.-.1.0.0.3.................
                  Process:C:\Windows\SysWOW64\PING.EXE
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):2342
                  Entropy (8bit):4.725019911843614
                  Encrypted:false
                  SSDEEP:12:PKMRJpTeTeTeTeTeTeTeTeTeTeTeTeTeTeTeTeTeTeTeTeTeTeTeTeTeTeTeTeTL:/Q/5AokItULVDv
                  MD5:7A559C3B1494D896C79D9CA23EA8A48F
                  SHA1:93713262CF69081EF835824234A91FF57910C861
                  SHA-256:8FFB12299478980F44C9E70949F03031BBCA244270E08C429D39807601AE9433
                  SHA-512:CC78AF792F52DB67355BE5A5E58D6813E460744CC1B6E3BD4B90B17C6EB919A252BF56184F96F7CF02D72BDA235BC6C19B52BC58CFC17195B37A0F5828201609
                  Malicious:false
                  Preview:..Pinging 127.0.0.1 with 32 bytes of data:..Reply from 127.0.0.1: bytes=32 time<1ms TTL=128..Reply from 127.0.0.1: bytes=32 time<1ms TTL=128..Reply from 127.0.0.1: bytes=32 time<1ms TTL=128..Reply from 127.0.0.1: bytes=32 time<1ms TTL=128..Reply from 127.0.0.1: bytes=32 time<1ms TTL=128..Reply from 127.0.0.1: bytes=32 time<1ms TTL=128..Reply from 127.0.0.1: bytes=32 time<1ms TTL=128..Reply from 127.0.0.1: bytes=32 time<1ms TTL=128..Reply from 127.0.0.1: bytes=32 time<1ms TTL=128..Reply from 127.0.0.1: bytes=32 time<1ms TTL=128..Reply from 127.0.0.1: bytes=32 time<1ms TTL=128..Reply from 127.0.0.1: bytes=32 time<1ms TTL=128..Reply from 127.0.0.1: bytes=32 time<1ms TTL=128..Reply from 127.0.0.1: bytes=32 time<1ms TTL=128..Reply from 127.0.0.1: bytes=32 time<1ms TTL=128..Reply from 127.0.0.1: bytes=32 time<1ms TTL=128..Reply from 127.0.0.1: bytes=32 time<1ms TTL=128..Reply from 127.0.0.1: bytes=32 time<1ms TTL=128..Reply from 127.0.0.1: bytes=32 time<1ms TTL=128..Reply from 127.0.0.1: byt
                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                  Entropy (8bit):6.632933062634782
                  TrID:
                  • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                  • Win32 Executable (generic) a (10002005/4) 49.97%
                  • Generic Win/DOS Executable (2004/3) 0.01%
                  • DOS Executable Generic (2002/1) 0.01%
                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                  File name:K59gVXTgGv.exe
                  File size:1'735'048 bytes
                  MD5:b7ca45674c6b8a24a6a71315e0e51397
                  SHA1:79516b1bd2227f08ff333b950dafb29707916828
                  SHA256:63d2c37fdb370cf6e743bd75e7408f5eded5bc823a29401eeafe0bea921657bb
                  SHA512:f390c2d017c041b60c57a67508341512785efbd25cb93a5c2849b4a5adb52931ea92eca7bbbef3e0cae0c919525770582e4c5e2518033c1c61542c0c2c1ebf2f
                  SSDEEP:24576:iRJSuMgl+JTBJ5aB3KoWWbHcXThtehTl5O9TLb:0IEFd/CTqR8P
                  TLSH:BB856B06E2A8FED7C409C1788C36C1B143EA7C9AD61781AF24F67E963EF23D41129957
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...g..d..............P......@........... ... ....@.. ....................................`................................
                  Icon Hash:173149cccc490307
                  Entrypoint:0x50132e
                  Entrypoint Section:.text
                  Digitally signed:true
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                  DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Time Stamp:0x649A1167 [Mon Jun 26 22:29:59 2023 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:4
                  OS Version Minor:0
                  File Version Major:4
                  File Version Minor:0
                  Subsystem Version Major:4
                  Subsystem Version Minor:0
                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                  Signature Valid:
                  Signature Issuer:
                  Signature Validation Error:
                  Error Number:
                  Not Before, Not After
                    Subject Chain
                      Version:
                      Thumbprint MD5:
                      Thumbprint SHA-1:
                      Thumbprint SHA-256:
                      Serial:
                      Instruction
                      jmp dword ptr [00402000h]
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x1012dc0x4f.text
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x1020000x53d70.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x1536000x54388
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x1560000xc.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x20000xff3340xff40062f65a13ea765d5bbd341a2ff8585c91False0.6681495240572968data6.961855800562577IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rsrc0x1020000x53d700x53e003cd24c7648cc0c247d6c869905635916False0.49696989102086436data6.211945994263363IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0x1560000xc0x200930d619476dd2c8b6b2b8731192b23c1False0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      RT_CURSOR0x1035400x134data0.4837662337662338
                      RT_CURSOR0x1036740x134data0.22402597402597402
                      RT_CURSOR0x1037a80x134Targa image data - RLE 64 x 65536 x 1 +32 "\001"0.2077922077922078
                      RT_CURSOR0x1038dc0x134data0.461038961038961
                      RT_CURSOR0x103a100x134data0.39935064935064934
                      RT_CURSOR0x103b440xcacdata0.08446362515413071
                      RT_CURSOR0x1047f00x134data0.32142857142857145
                      RT_CURSOR0x1049240xcacdata0.06103575832305795
                      RT_CURSOR0x1055d00x10acTarga image data 64 x 65536 x 1 +32 " "0.03280224929709466
                      RT_CURSOR0x10667c0x10acTarga image data 64 x 65536 x 1 +32 " "0.07966260543580131
                      RT_CURSOR0x1077280x10acTarga image data 64 x 65536 x 1 +32 " "0.07872539831302718
                      RT_CURSOR0x1087d40x10acTarga image data 64 x 65536 x 1 +32 " "0.07591377694470477
                      RT_CURSOR0x1098800x10acTarga image data 64 x 65536 x 1 +32 " "0.03420805998125586
                      RT_CURSOR0x10a92c0x10acTarga image data 64 x 65536 x 1 +32 " "0.03655107778819119
                      RT_CURSOR0x10b9d80x10acTarga image data 64 x 65536 x 1 +32 " "0.03795688847235239
                      RT_CURSOR0x10ca840x10acTarga image data 64 x 65536 x 1 +32 " "0.03303655107778819
                      RT_CURSOR0x10db300x10acTarga image data 64 x 65536 x 1 +32 " "0.036785379568884724
                      RT_CURSOR0x10ebdc0x10acTarga image data 64 x 65536 x 1 +32 " "0.03608247422680412
                      RT_CURSOR0x10fc880x10acTarga image data 64 x 65536 x 1 +32 " "0.042877225866916585
                      RT_CURSOR0x110d340x134Targa image data - RGB - RLE 64 x 65536 x 1 +32 "\001"0.23376623376623376
                      RT_CURSOR0x110e680x134Targa image data - Mono 64 x 65536 x 1 +32 "\001"0.1590909090909091
                      RT_CURSOR0x110f9c0x134data0.3181818181818182
                      RT_CURSOR0x1110d00x134data0.30194805194805197
                      RT_ICON0x1112040x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.4913294797687861
                      RT_ICON0x11176c0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.46435018050541516
                      RT_ICON0x1120140xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.39072494669509594
                      RT_ICON0x112ebc0x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.6214539007092199
                      RT_ICON0x1133240x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 00.4298780487804878
                      RT_ICON0x1143cc0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.32863070539419087
                      RT_ICON0x1169740x7cfcPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9984998124765596
                      RT_ICON0x11e6700x38Device independent bitmap graphic, 1 x 2 x 1, image size 00.4107142857142857
                      RT_ICON0x11e6a80x38Device independent bitmap graphic, 1 x 2 x 1, image size 00.4107142857142857
                      RT_ICON0x11e6e00x38Device independent bitmap graphic, 1 x 2 x 1, image size 00.4107142857142857
                      RT_ICON0x11e7180x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.4429190751445087
                      RT_ICON0x11ec800x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.411101083032491
                      RT_ICON0x11f5280xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.35047974413646055
                      RT_ICON0x1203d00x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.6046099290780141
                      RT_ICON0x1208380x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 00.40196998123827393
                      RT_ICON0x1218e00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.31483402489626555
                      RT_ICON0x123e880x7c98PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9978994231251568
                      RT_ICON0x12bb200xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.2332089552238806
                      RT_ICON0x12c9c80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.3564981949458484
                      RT_ICON0x12d2700x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.5173410404624278
                      RT_ICON0x12d7d80x7faPNG image data, 256 x 256, 8-bit colormap, non-interlaced0.8736532810969637
                      RT_ICON0x12dfd40x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.06732365145228215
                      RT_ICON0x13057c0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 00.10694183864915573
                      RT_ICON0x1316240x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.25177304964539005
                      RT_ICON0x131a8c0xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.2260127931769723
                      RT_ICON0x1329340x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.3456678700361011
                      RT_ICON0x1331dc0x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.5079479768786127
                      RT_ICON0x1337440x7c8PNG image data, 256 x 256, 8-bit colormap, non-interlaced0.8704819277108434
                      RT_ICON0x133f0c0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.06244813278008299
                      RT_ICON0x1364b40x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 00.09803001876172608
                      RT_ICON0x13755c0x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.23049645390070922
                      RT_ICON0x1379c40x4a8Device independent bitmap graphic, 17 x 32 x 32, image size 1088, resolution 2835 x 2835 px/m0.28439597315436244
                      RT_ICON0x137e6c0x1234Device independent bitmap graphic, 33 x 66 x 32, image size 4356, resolution 2835 x 2835 px/m0.11566523605150214
                      RT_ICON0x1390a00x2668Device independent bitmap graphic, 49 x 96 x 32, image size 9408, resolution 2835 x 2835 px/m0.07811228641171684
                      RT_ICON0x13b7080x184bPNG image data, 257 x 256, 8-bit/color RGBA, non-interlaced0.992603312429651
                      RT_ICON0x13cf540x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.4552023121387283
                      RT_ICON0x13d4bc0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.43772563176895307
                      RT_ICON0x13dd640xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.4013859275053305
                      RT_ICON0x13ec0c0x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.5638297872340425
                      RT_ICON0x13f0740x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 00.3574108818011257
                      RT_ICON0x14011c0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.300103734439834
                      RT_ICON0x1426c40x6c1cPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9986631016042781
                      RT_ICON0x1492e00x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.4653179190751445
                      RT_ICON0x1498480x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.4426895306859206
                      RT_ICON0x14a0f00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.4064498933901919
                      RT_ICON0x14af980x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.5709219858156028
                      RT_ICON0x14b4000x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 00.3602251407129456
                      RT_ICON0x14c4a80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.30072614107883816
                      RT_ICON0x14ea500x6a18PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9981958762886598
                      RT_GROUP_CURSOR0x1554680x14Lotus unknown worksheet or configuration, revision 0x11.25
                      RT_GROUP_CURSOR0x15547c0x14Lotus unknown worksheet or configuration, revision 0x11.25
                      RT_GROUP_CURSOR0x1554900x14Lotus unknown worksheet or configuration, revision 0x11.3
                      RT_GROUP_CURSOR0x1554a40x14Lotus unknown worksheet or configuration, revision 0x11.3
                      RT_GROUP_CURSOR0x1554b80x22Lotus unknown worksheet or configuration, revision 0x21.0
                      RT_GROUP_CURSOR0x1554dc0x22Lotus unknown worksheet or configuration, revision 0x21.0
                      RT_GROUP_CURSOR0x1555000x14Lotus unknown worksheet or configuration, revision 0x11.2
                      RT_GROUP_CURSOR0x1555140x14Lotus unknown worksheet or configuration, revision 0x11.2
                      RT_GROUP_CURSOR0x1555280x14Lotus unknown worksheet or configuration, revision 0x11.2
                      RT_GROUP_CURSOR0x15553c0x14Lotus unknown worksheet or configuration, revision 0x11.2
                      RT_GROUP_CURSOR0x1555500x14Lotus unknown worksheet or configuration, revision 0x11.2
                      RT_GROUP_CURSOR0x1555640x14Lotus unknown worksheet or configuration, revision 0x11.2
                      RT_GROUP_CURSOR0x1555780x14Lotus unknown worksheet or configuration, revision 0x11.2
                      RT_GROUP_CURSOR0x15558c0x14Lotus unknown worksheet or configuration, revision 0x11.2
                      RT_GROUP_CURSOR0x1555a00x14Lotus unknown worksheet or configuration, revision 0x11.2
                      RT_GROUP_CURSOR0x1555b40x14Lotus unknown worksheet or configuration, revision 0x11.2
                      RT_GROUP_CURSOR0x1555c80x14Lotus unknown worksheet or configuration, revision 0x11.2
                      RT_GROUP_CURSOR0x1555dc0x14Lotus unknown worksheet or configuration, revision 0x11.3
                      RT_GROUP_CURSOR0x1555f00x14Lotus unknown worksheet or configuration, revision 0x11.3
                      RT_GROUP_CURSOR0x1556040x14Lotus unknown worksheet or configuration, revision 0x11.3
                      RT_GROUP_CURSOR0x1556180x14Lotus unknown worksheet or configuration, revision 0x11.3
                      RT_GROUP_ICON0x15562c0x68data0.7307692307692307
                      RT_GROUP_ICON0x1556940x14data1.1
                      RT_GROUP_ICON0x1556a80x14data1.1
                      RT_GROUP_ICON0x1556bc0x14data1.1
                      RT_GROUP_ICON0x1556d00x68data0.7403846153846154
                      RT_GROUP_ICON0x1557380x68data0.7115384615384616
                      RT_GROUP_ICON0x1557a00x68data0.7115384615384616
                      RT_GROUP_ICON0x1558080x3edata0.8870967741935484
                      RT_GROUP_ICON0x1558480x68data0.7307692307692307
                      RT_GROUP_ICON0x1558b00x68data0.7211538461538461
                      RT_VERSION0x1559180x458dataEnglishUnited States0.44064748201438847
                      DLLImport
                      mscoree.dll_CorExeMain
                      Language of compilation systemCountry where language is spokenMap
                      EnglishUnited States
                      TimestampSource PortDest PortSource IPDest IP
                      Jul 1, 2024 08:26:58.001311064 CEST4970580192.168.2.5142.250.185.164
                      Jul 1, 2024 08:26:58.006217957 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.006336927 CEST4970580192.168.2.5142.250.185.164
                      Jul 1, 2024 08:26:58.006576061 CEST4970580192.168.2.5142.250.185.164
                      Jul 1, 2024 08:26:58.011384964 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.671827078 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.671885014 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.671920061 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.671947002 CEST4970580192.168.2.5142.250.185.164
                      Jul 1, 2024 08:26:58.671952963 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.671988010 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.672020912 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.672024012 CEST4970580192.168.2.5142.250.185.164
                      Jul 1, 2024 08:26:58.672054052 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.672069073 CEST4970580192.168.2.5142.250.185.164
                      Jul 1, 2024 08:26:58.672087908 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.672120094 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.672156096 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.672159910 CEST4970580192.168.2.5142.250.185.164
                      Jul 1, 2024 08:26:58.672205925 CEST4970580192.168.2.5142.250.185.164
                      Jul 1, 2024 08:26:58.677032948 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.677088022 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.677148104 CEST4970580192.168.2.5142.250.185.164
                      Jul 1, 2024 08:26:58.760669947 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.760781050 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.760817051 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.760854006 CEST4970580192.168.2.5142.250.185.164
                      Jul 1, 2024 08:26:58.761136055 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.761169910 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.761204004 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.761231899 CEST4970580192.168.2.5142.250.185.164
                      Jul 1, 2024 08:26:58.761257887 CEST4970580192.168.2.5142.250.185.164
                      Jul 1, 2024 08:26:58.770225048 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.770257950 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.770292997 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.770312071 CEST4970580192.168.2.5142.250.185.164
                      Jul 1, 2024 08:26:58.773196936 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.773278952 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.773310900 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.773329973 CEST4970580192.168.2.5142.250.185.164
                      Jul 1, 2024 08:26:58.773386002 CEST4970580192.168.2.5142.250.185.164
                      Jul 1, 2024 08:26:58.779247046 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.779279947 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.779310942 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.779367924 CEST4970580192.168.2.5142.250.185.164
                      Jul 1, 2024 08:26:58.785517931 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.785552025 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.785583019 CEST4970580192.168.2.5142.250.185.164
                      Jul 1, 2024 08:26:58.785583973 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.785645962 CEST4970580192.168.2.5142.250.185.164
                      Jul 1, 2024 08:26:58.791285038 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.791349888 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.791383028 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.791399002 CEST4970580192.168.2.5142.250.185.164
                      Jul 1, 2024 08:26:58.797246933 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.797343016 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.797349930 CEST4970580192.168.2.5142.250.185.164
                      Jul 1, 2024 08:26:58.797375917 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.797449112 CEST4970580192.168.2.5142.250.185.164
                      Jul 1, 2024 08:26:58.803215027 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.803244114 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.803277969 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.803342104 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.803383112 CEST4970580192.168.2.5142.250.185.164
                      Jul 1, 2024 08:26:58.803383112 CEST4970580192.168.2.5142.250.185.164
                      Jul 1, 2024 08:26:58.809190989 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.809292078 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.809322119 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.809341908 CEST4970580192.168.2.5142.250.185.164
                      Jul 1, 2024 08:26:58.809355021 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.809392929 CEST4970580192.168.2.5142.250.185.164
                      Jul 1, 2024 08:26:58.849302053 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.849335909 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.849370003 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.849396944 CEST4970580192.168.2.5142.250.185.164
                      Jul 1, 2024 08:26:58.849401951 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.849436045 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.849478960 CEST4970580192.168.2.5142.250.185.164
                      Jul 1, 2024 08:26:58.853332996 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.853365898 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.853396893 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.853518963 CEST4970580192.168.2.5142.250.185.164
                      Jul 1, 2024 08:26:58.859318018 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.859417915 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.859450102 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.859498024 CEST4970580192.168.2.5142.250.185.164
                      Jul 1, 2024 08:26:58.865319014 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.865351915 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.865369081 CEST4970580192.168.2.5142.250.185.164
                      Jul 1, 2024 08:26:58.865382910 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.865463018 CEST4970580192.168.2.5142.250.185.164
                      Jul 1, 2024 08:26:58.889996052 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.890079021 CEST8049705142.250.185.164192.168.2.5
                      Jul 1, 2024 08:26:58.890234947 CEST4970580192.168.2.5142.250.185.164
                      Jul 1, 2024 08:27:35.064106941 CEST4970580192.168.2.5142.250.185.164
                      Jul 1, 2024 08:28:57.393240929 CEST4971880192.168.2.5142.250.185.164
                      Jul 1, 2024 08:28:57.398905039 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:57.398988962 CEST4971880192.168.2.5142.250.185.164
                      Jul 1, 2024 08:28:57.399290085 CEST4971880192.168.2.5142.250.185.164
                      Jul 1, 2024 08:28:57.404958963 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.071584940 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.071600914 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.071611881 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.071624041 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.071635962 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.071645975 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.071656942 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.071657896 CEST4971880192.168.2.5142.250.185.164
                      Jul 1, 2024 08:28:58.071670055 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.071723938 CEST4971880192.168.2.5142.250.185.164
                      Jul 1, 2024 08:28:58.071749926 CEST4971880192.168.2.5142.250.185.164
                      Jul 1, 2024 08:28:58.071751118 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.071763039 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.071805000 CEST4971880192.168.2.5142.250.185.164
                      Jul 1, 2024 08:28:58.076615095 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.076630116 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.076643944 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.076699972 CEST4971880192.168.2.5142.250.185.164
                      Jul 1, 2024 08:28:58.160655975 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.160671949 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.160686016 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.160778046 CEST4971880192.168.2.5142.250.185.164
                      Jul 1, 2024 08:28:58.161279917 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.161292076 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.161303043 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.161443949 CEST4971880192.168.2.5142.250.185.164
                      Jul 1, 2024 08:28:58.161443949 CEST4971880192.168.2.5142.250.185.164
                      Jul 1, 2024 08:28:58.170557022 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.170571089 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.170582056 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.170618057 CEST4971880192.168.2.5142.250.185.164
                      Jul 1, 2024 08:28:58.173113108 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.173125029 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.173173904 CEST4971880192.168.2.5142.250.185.164
                      Jul 1, 2024 08:28:58.173187017 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.173198938 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.173238039 CEST4971880192.168.2.5142.250.185.164
                      Jul 1, 2024 08:28:58.189199924 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.189256907 CEST4971880192.168.2.5142.250.185.164
                      Jul 1, 2024 08:28:58.189361095 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.189373016 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.189378977 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.189390898 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.189518929 CEST4971880192.168.2.5142.250.185.164
                      Jul 1, 2024 08:28:58.189518929 CEST4971880192.168.2.5142.250.185.164
                      Jul 1, 2024 08:28:58.193970919 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.193983078 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.193994045 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.194030046 CEST4971880192.168.2.5142.250.185.164
                      Jul 1, 2024 08:28:58.197211981 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.197251081 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.197261095 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.197266102 CEST4971880192.168.2.5142.250.185.164
                      Jul 1, 2024 08:28:58.197313070 CEST4971880192.168.2.5142.250.185.164
                      Jul 1, 2024 08:28:58.203463078 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.203474998 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.203495979 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.203516960 CEST4971880192.168.2.5142.250.185.164
                      Jul 1, 2024 08:28:58.209429026 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.209440947 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.209453106 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.209484100 CEST4971880192.168.2.5142.250.185.164
                      Jul 1, 2024 08:28:58.209517002 CEST4971880192.168.2.5142.250.185.164
                      Jul 1, 2024 08:28:58.249123096 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.249135971 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.249147892 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.249202967 CEST4971880192.168.2.5142.250.185.164
                      Jul 1, 2024 08:28:58.249274015 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.249284983 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.249294996 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.249413013 CEST4971880192.168.2.5142.250.185.164
                      Jul 1, 2024 08:28:58.249413967 CEST4971880192.168.2.5142.250.185.164
                      Jul 1, 2024 08:28:58.253582001 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.253593922 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.253603935 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.253643990 CEST4971880192.168.2.5142.250.185.164
                      Jul 1, 2024 08:28:58.259624958 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.259637117 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.259645939 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.259675980 CEST4971880192.168.2.5142.250.185.164
                      Jul 1, 2024 08:28:58.259727955 CEST4971880192.168.2.5142.250.185.164
                      Jul 1, 2024 08:28:58.265616894 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.265629053 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.265639067 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.265662909 CEST4971880192.168.2.5142.250.185.164
                      Jul 1, 2024 08:28:58.271656036 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.271667957 CEST8049718142.250.185.164192.168.2.5
                      Jul 1, 2024 08:28:58.271718025 CEST4971880192.168.2.5142.250.185.164
                      Jul 1, 2024 08:28:58.319847107 CEST4971880192.168.2.5142.250.185.164
                      TimestampSource PortDest PortSource IPDest IP
                      Jul 1, 2024 08:26:57.989820957 CEST5585753192.168.2.51.1.1.1
                      Jul 1, 2024 08:26:57.996589899 CEST53558571.1.1.1192.168.2.5
                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                      Jul 1, 2024 08:26:57.989820957 CEST192.168.2.51.1.1.10x2d15Standard query (0)www.google.comA (IP address)IN (0x0001)false
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                      Jul 1, 2024 08:26:57.996589899 CEST1.1.1.1192.168.2.50x2d15No error (0)www.google.com142.250.185.164A (IP address)IN (0x0001)false
                      • www.google.com
                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      0192.168.2.549705142.250.185.164805160C:\Users\user\Desktop\K59gVXTgGv.exe
                      TimestampBytes transferredDirectionData
                      Jul 1, 2024 08:26:58.006576061 CEST64OUTGET / HTTP/1.1
                      Host: www.google.com
                      Connection: Keep-Alive
                      Jul 1, 2024 08:26:58.671827078 CEST1236INHTTP/1.1 200 OK
                      Date: Mon, 01 Jul 2024 06:26:58 GMT
                      Expires: -1
                      Cache-Control: private, max-age=0
                      Content-Type: text/html; charset=ISO-8859-1
                      Content-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-r-v2lPLc9S4itAJ6OeFjRw' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp
                      P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                      Server: gws
                      X-XSS-Protection: 0
                      X-Frame-Options: SAMEORIGIN
                      Set-Cookie: AEC=AQTF6HyAViGHWpclHbpGkp9MY1DIksljjj1V18txPAtxwjkUX0pfgg_wKRI; expires=Sat, 28-Dec-2024 06:26:58 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=lax
                      Set-Cookie: NID=515=n2zFv__emfA8HY2RktY5rmmo5ou-IINT6-SM3w0pCXkQML7HgMm2KP7yR1iMtjbU5MFxrsJ7oQwud76F27MtAKcU6Nnb2clhwd_lI1XB-5vWTvL9WZCnMRwf8S-qhwZHZx0l5DIOCcSx6pGTHD6Wuerrlv0LB4XdZzKnjM4IUkg; expires=Tue, 31-Dec-2024 06:26:58 GMT; path=/; domain=.google.com; HttpOnly
                      Accept-Ranges: none
                      Vary: Accept-Encoding
                      Transfer-Encoding: chunked
                      Data Raw: 34 36 36 31 0d 0a 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 69 74 65 6d 73 63 6f 70 65 3d 22 22 20 69 74 65 6d 74 79 70 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 2e 6f 72 67 2f 57 65 62 50 61 67 65 22 20 6c 61 6e 67 3d 22 65 6e 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 53 65 61 72 63 68 20 74 68 65 20 77 6f 72 6c 64 27 73 20 69 6e 66 6f 72 6d 61 74 69 6f 6e 2c 20 69 6e 63 6c 75 64 69 6e 67 20 77 65 62 70 61 67 65 73 2c 20 69 6d 61 67 65 73 2c 20 76 69 64 65 6f 73 20 61 6e 64 20 6d 6f 72 65 2e 20 47 6f 6f 67 6c 65 20
                      Data Ascii: 4661<!doctype html><html itemscope="" itemtype="http://schema.org/WebPage" lang="en"><head><meta content="Search the world's information, including webpages, images, videos and more. Google
                      Jul 1, 2024 08:26:58.671885014 CEST1236INData Raw: 68 61 73 20 6d 61 6e 79 20 73 70 65 63 69 61 6c 20 66 65 61 74 75 72 65 73 20 74 6f 20 68 65 6c 70 20 79 6f 75 20 66 69 6e 64 20 65 78 61 63 74 6c 79 20 77 68 61 74 20 79 6f 75 27 72 65 20 6c 6f 6f 6b 69 6e 67 20 66 6f 72 2e 22 20 6e 61 6d 65 3d
                      Data Ascii: has many special features to help you find exactly what you're looking for." name="description"><meta content="noodp, " name="robots"><meta content="text/html; charset=UTF-8" http-equiv="Content-Type"><meta content="/images/branding/googleg/1x
                      Jul 1, 2024 08:26:58.671920061 CEST1236INData Raw: 38 2c 31 30 36 31 2c 31 30 35 34 2c 32 2c 33 2c 31 35 33 31 2c 32 31 35 2c 31 30 38 2c 39 39 31 2c 34 39 38 2c 31 2c 35 37 31 2c 31 39 39 2c 33 37 30 2c 33 32 34 2c 31 2c 34 2c 32 2c 31 35 39 34 2c 32 37 39 2c 37 2c 31 32 2c 36 32 33 2c 31 37 33
                      Data Ascii: 8,1061,1054,2,3,1531,215,108,991,498,1,571,199,370,324,1,4,2,1594,279,7,12,623,1736,868,44,662,64,3,1,834,437,654,1,3,57,202,528,163,1,2,1435,4,244,179,116,831,121,545,1282,428,36,436,867,122,4,1,6,155,378,142,1570,4,367,3,93,1685,22,107,172,1
                      Jul 1, 2024 08:26:58.671952963 CEST1236INData Raw: 69 2e 74 65 73 74 28 61 29 26 26 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 70 72 6f 74 6f 63 6f 6c 3d 3d 3d 22 68 74 74 70 73 3a 22 26 26 28 67 6f 6f 67 6c 65 2e 6d 6c 26 26 67 6f 6f 67 6c 65 2e 6d 6c 28 45 72 72 6f 72 28 22 61 22 29 2c 21
                      Data Ascii: i.test(a)&&window.location.protocol==="https:"&&(google.ml&&google.ml(Error("a"),!1,{src:a,glmm:1}),a="");return a}function t(a,b,c,d,k){var e="";b.search("&ei=")===-1&&(e="&ei="+p(d),b.search("&lei=")===-1&&(d=q(d))&&(e+="&lei="+d));d="";var
                      Jul 1, 2024 08:26:58.671988010 CEST896INData Raw: 65 2e 6c 71 2e 70 75 73 68 28 5b 61 2c 62 5d 29 7d 3b 67 6f 6f 67 6c 65 2e 62 78 3d 21 31 3b 67 6f 6f 67 6c 65 2e 6c 78 3d 66 75 6e 63 74 69 6f 6e 28 29 7b 7d 3b 76 61 72 20 64 3d 5b 5d 3b 67 6f 6f 67 6c 65 2e 66 63 65 3d 66 75 6e 63 74 69 6f 6e
                      Data Ascii: e.lq.push([a,b])};google.bx=!1;google.lx=function(){};var d=[];google.fce=function(a,b,c,e){d.push([a,b,c,e])};google.qce=d;}).call(this);google.f={};(function(){document.documentElement.addEventListener("submit",function(b){var a;if(a=b.targ
                      Jul 1, 2024 08:26:58.672020912 CEST1236INData Raw: 39 70 78 3b 76 69 73 69 62 69 6c 69 74 79 3a 68 69 64 64 65 6e 3b 7a 2d 69 6e 64 65 78 3a 39 39 38 3b 72 69 67 68 74 3a 30 7d 2e 67 62 74 6f 20 23 67 62 73 7b 62 61 63 6b 67 72 6f 75 6e 64 3a 23 66 66 66 7d 23 67 62 78 33 2c 23 67 62 78 34 7b 62
                      Data Ascii: 9px;visibility:hidden;z-index:998;right:0}.gbto #gbs{background:#fff}#gbx3,#gbx4{background-color:#2d2d2d;background-image:none;_background-image:none;background-position:0 -138px;background-repeat:repeat-x;border-bottom:1px solid #000;font-si
                      Jul 1, 2024 08:26:58.672054052 CEST1236INData Raw: 31 3b 2a 74 6f 70 3a 2d 32 70 78 3b 2a 6c 65 66 74 3a 2d 35 70 78 3b 2a 72 69 67 68 74 3a 35 70 78 3b 2a 62 6f 74 74 6f 6d 3a 34 70 78 3b 2d 6d 73 2d 66 69 6c 74 65 72 3a 22 70 72 6f 67 69 64 3a 44 58 49 6d 61 67 65 54 72 61 6e 73 66 6f 72 6d 2e
                      Data Ascii: 1;*top:-2px;*left:-5px;*right:5px;*bottom:4px;-ms-filter:"progid:DXImageTransform.Microsoft.Blur(pixelradius=5)";opacity:1\0/;top:-4px\0/;left:-6px\0/;right:5px\0/;bottom:4px\0/}.gbma{position:relative;top:-1px;border-style:solid dashed dashed
                      Jul 1, 2024 08:26:58.672087908 CEST1236INData Raw: 62 65 3b 63 6f 6c 6f 72 3a 23 33 36 63 3b 70 61 64 64 69 6e 67 2d 62 6f 74 74 6f 6d 3a 31 70 78 3b 70 61 64 64 69 6e 67 2d 74 6f 70 3a 32 70 78 7d 2e 67 62 7a 30 6c 20 2e 67 62 74 73 7b 63 6f 6c 6f 72 3a 23 66 66 66 3b 66 6f 6e 74 2d 77 65 69 67
                      Data Ascii: be;color:#36c;padding-bottom:1px;padding-top:2px}.gbz0l .gbts{color:#fff;font-weight:bold}.gbtsa{padding-right:9px}#gbz .gbzt,#gbz .gbgt,#gbg .gbgt{color:#ccc!important}.gbtb2{display:block;border-top:2px solid transparent}.gbto .gbzt .gbtb2,.
                      Jul 1, 2024 08:26:58.672120094 CEST1236INData Raw: 34 69 64 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 70 6f 73 69 74 69 6f 6e 3a 2d 34 34 70 78 20 2d 31 30 31 70 78 7d 23 67 62 6d 70 69 64 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 70 6f 73 69 74 69 6f 6e 3a 30 20 30 7d 23 67 62 6d 70 69 2c 23 67 62 6d 70 69
                      Data Ascii: 4id{background-position:-44px -101px}#gbmpid{background-position:0 0}#gbmpi,#gbmpid{border:none;display:inline-block;height:48px;width:48px}#gbmpiw{display:inline-block;line-height:9px;padding-left:20px;margin-top:10px;position:relative}#gbmpi
                      Jul 1, 2024 08:26:58.672156096 CEST1236INData Raw: 2e 67 62 6d 6c 62 3a 76 69 73 69 74 65 64 7b 6c 69 6e 65 2d 68 65 69 67 68 74 3a 32 37 70 78 7d 2e 67 62 6d 6c 62 2d 68 76 72 2c 2e 67 62 6d 6c 62 3a 66 6f 63 75 73 7b 6f 75 74 6c 69 6e 65 3a 6e 6f 6e 65 3b 74 65 78 74 2d 64 65 63 6f 72 61 74 69
                      Data Ascii: .gbmlb:visited{line-height:27px}.gbmlb-hvr,.gbmlb:focus{outline:none;text-decoration:underline !important}.gbmlbw{color:#ccc;margin:0 10px}.gbmt{padding:0 20px}.gbmt:hover,.gbmt:focus{background:#eee;cursor:pointer;outline:0 solid black;text-d
                      Jul 1, 2024 08:26:58.677032948 CEST1236INData Raw: 67 69 6e 3a 30 20 32 30 70 78 7d 23 67 62 6d 70 6c 70 2e 67 62 70 73 7b 6d 61 72 67 69 6e 3a 30 20 31 30 70 78 7d 2e 67 62 70 63 20 2e 67 62 70 73 7b 63 6f 6c 6f 72 3a 23 30 30 30 3b 66 6f 6e 74 2d 77 65 69 67 68 74 3a 62 6f 6c 64 7d 2e 67 62 70
                      Data Ascii: gin:0 20px}#gbmplp.gbps{margin:0 10px}.gbpc .gbps{color:#000;font-weight:bold}.gbpc .gbpd{margin-bottom:5px}.gbpd .gbmt,.gbpd .gbps{color:#666 !important}.gbpd .gbmt{opacity:.4;filter:alpha(opacity=40)}.gbps2{color:#666;display:block}.gbp0{dis


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      1192.168.2.549718142.250.185.164802364C:\Program Files (x86)\Google Chrome sandbox.exe.exe
                      TimestampBytes transferredDirectionData
                      Jul 1, 2024 08:28:57.399290085 CEST64OUTGET / HTTP/1.1
                      Host: www.google.com
                      Connection: Keep-Alive
                      Jul 1, 2024 08:28:58.071584940 CEST1236INHTTP/1.1 200 OK
                      Date: Mon, 01 Jul 2024 06:28:57 GMT
                      Expires: -1
                      Cache-Control: private, max-age=0
                      Content-Type: text/html; charset=ISO-8859-1
                      Content-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-ShaLFNmRdvuZ1kGvyC2zCQ' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp
                      P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                      Server: gws
                      X-XSS-Protection: 0
                      X-Frame-Options: SAMEORIGIN
                      Set-Cookie: AEC=AQTF6Hx0BR1qOccPPlnBP0ah0VRPONeHF6wVsKbzautA0RX9vp7SD6AWM-k; expires=Sat, 28-Dec-2024 06:28:57 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=lax
                      Set-Cookie: NID=515=Yh4z3hcKPq5rzopEiXVFMP1hdi7dC_ZpfPh-HsjarCYTW8LzDlIVRF29CFgRy0v_rgL96cl_I9m1tY_dUgV0gmq8yHD3FrOKqjKcz6OEp392RCOMPq-KJ6Z7PLDfSyTXfwOJ7Z74yZzSPABLARQatSlk1YTtRPhKpE1JkVNmbt0; expires=Tue, 31-Dec-2024 06:28:57 GMT; path=/; domain=.google.com; HttpOnly
                      Accept-Ranges: none
                      Vary: Accept-Encoding
                      Transfer-Encoding: chunked
                      Data Raw: 34 36 63 36 0d 0a 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 69 74 65 6d 73 63 6f 70 65 3d 22 22 20 69 74 65 6d 74 79 70 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 2e 6f 72 67 2f 57 65 62 50 61 67 65 22 20 6c 61 6e 67 3d 22 65 6e 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 53 65 61 72 63 68 20 74 68 65 20 77 6f 72 6c 64 27 73 20 69 6e 66 6f 72 6d 61 74 69 6f 6e 2c 20 69 6e 63 6c 75 64 69 6e 67 20 77 65 62 70 61 67 65 73 2c 20 69 6d 61 67 65 73 2c 20 76 69 64 65 6f 73 20 61 6e 64 20 6d 6f 72 65 2e 20 47 6f 6f 67 6c 65 20
                      Data Ascii: 46c6<!doctype html><html itemscope="" itemtype="http://schema.org/WebPage" lang="en"><head><meta content="Search the world's information, including webpages, images, videos and more. Google
                      Jul 1, 2024 08:28:58.071600914 CEST1236INData Raw: 68 61 73 20 6d 61 6e 79 20 73 70 65 63 69 61 6c 20 66 65 61 74 75 72 65 73 20 74 6f 20 68 65 6c 70 20 79 6f 75 20 66 69 6e 64 20 65 78 61 63 74 6c 79 20 77 68 61 74 20 79 6f 75 27 72 65 20 6c 6f 6f 6b 69 6e 67 20 66 6f 72 2e 22 20 6e 61 6d 65 3d
                      Data Ascii: has many special features to help you find exactly what you're looking for." name="description"><meta content="noodp, " name="robots"><meta content="text/html; charset=UTF-8" http-equiv="Content-Type"><meta content="/images/branding/googleg/1x
                      Jul 1, 2024 08:28:58.071611881 CEST1236INData Raw: 30 2c 32 33 37 2c 34 34 36 2c 34 35 32 2c 32 30 37 2c 31 39 2c 34 37 35 33 2c 31 2c 34 2c 32 2c 38 39 37 2c 34 35 2c 34 36 35 2c 31 39 38 31 2c 31 30 33 38 2c 31 34 2c 32 2c 33 2c 33 39 31 2c 31 31 33 38 2c 32 31 37 2c 31 30 37 2c 37 35 33 2c 32
                      Data Ascii: 0,237,446,452,207,19,4753,1,4,2,897,45,465,1981,1038,14,2,3,391,1138,217,107,753,2,239,496,1,770,370,356,1136,433,279,7,12,623,1375,361,15,1,1,1621,3,1,834,437,654,1,3,57,202,2129,4,245,294,834,118,1813,479,435,867,396,412,1574,367,3,93,573,11
                      Jul 1, 2024 08:28:58.071624041 CEST1236INData Raw: 74 70 3a 2f 69 2e 74 65 73 74 28 61 29 26 26 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 70 72 6f 74 6f 63 6f 6c 3d 3d 3d 22 68 74 74 70 73 3a 22 26 26 28 67 6f 6f 67 6c 65 2e 6d 6c 26 26 67 6f 6f 67 6c 65 2e 6d 6c 28 45 72 72 6f 72 28 22 61
                      Data Ascii: tp:/i.test(a)&&window.location.protocol==="https:"&&(google.ml&&google.ml(Error("a"),!1,{src:a,glmm:1}),a="");return a}function t(a,b,c,d,k){var e="";b.search("&ei=")===-1&&(e="&ei="+p(d),b.search("&lei=")===-1&&(d=q(d))&&(e+="&lei="+d));d=""
                      Jul 1, 2024 08:28:58.071635962 CEST1236INData Raw: 6f 6f 67 6c 65 2e 6c 71 2e 70 75 73 68 28 5b 61 2c 62 5d 29 7d 3b 67 6f 6f 67 6c 65 2e 62 78 3d 21 31 3b 67 6f 6f 67 6c 65 2e 6c 78 3d 66 75 6e 63 74 69 6f 6e 28 29 7b 7d 3b 76 61 72 20 64 3d 5b 5d 3b 67 6f 6f 67 6c 65 2e 66 63 65 3d 66 75 6e 63
                      Data Ascii: oogle.lq.push([a,b])};google.bx=!1;google.lx=function(){};var d=[];google.fce=function(a,b,c,e){d.push([a,b,c,e])};google.qce=d;}).call(this);google.f={};(function(){document.documentElement.addEventListener("submit",function(b){var a;if(a=b.
                      Jul 1, 2024 08:28:58.071645975 CEST1120INData Raw: 77 69 64 74 68 3a 31 30 30 25 3b 7a 2d 69 6e 64 65 78 3a 39 39 30 7d 23 67 62 78 33 7b 6c 65 66 74 3a 30 7d 23 67 62 78 34 7b 72 69 67 68 74 3a 30 7d 23 67 62 62 7b 70 6f 73 69 74 69 6f 6e 3a 72 65 6c 61 74 69 76 65 7d 23 67 62 62 77 7b 6c 65 66
                      Data Ascii: width:100%;z-index:990}#gbx3{left:0}#gbx4{right:0}#gbb{position:relative}#gbbw{left:0;position:absolute;top:30px;width:100%}.gbtcb{position:absolute;visibility:hidden}#gbz .gbtcb{right:0}#gbg .gbtcb{left:0}.gbxx{display:none !important}.gbxo{o
                      Jul 1, 2024 08:28:58.071656942 CEST1236INData Raw: 79 6c 65 3a 73 6f 6c 69 64 20 64 61 73 68 65 64 20 64 61 73 68 65 64 3b 62 6f 72 64 65 72 2d 63 6f 6c 6f 72 3a 74 72 61 6e 73 70 61 72 65 6e 74 3b 62 6f 72 64 65 72 2d 74 6f 70 2d 63 6f 6c 6f 72 3a 23 63 30 63 30 63 30 3b 64 69 73 70 6c 61 79 3a
                      Data Ascii: yle:solid dashed dashed;border-color:transparent;border-top-color:#c0c0c0;display:-moz-inline-box;display:inline-block;font-size:0;height:0;line-height:0;width:0;border-width:3px 3px 0;padding-top:1px;left:4px}#gbztms1,#gbi4m1,#gbi4s,#gbi4t{zo
                      Jul 1, 2024 08:28:58.071670055 CEST1236INData Raw: 6e 74 7d 2e 67 62 74 6f 20 2e 67 62 7a 74 20 2e 67 62 74 62 32 2c 2e 67 62 74 6f 20 2e 67 62 67 74 20 2e 67 62 74 62 32 7b 62 6f 72 64 65 72 2d 74 6f 70 2d 77 69 64 74 68 3a 30 7d 2e 67 62 74 62 20 2e 67 62 74 73 7b 62 61 63 6b 67 72 6f 75 6e 64
                      Data Ascii: nt}.gbto .gbzt .gbtb2,.gbto .gbgt .gbtb2{border-top-width:0}.gbtb .gbts{background:url(https://ssl.gstatic.com/gb/images/b_8d5afc09.png);_background:url(https://ssl.gstatic.com/gb/images/b8_3615d64d.png);background-position:-27px -22px;border:
                      Jul 1, 2024 08:28:58.071751118 CEST1236INData Raw: 6f 73 69 74 69 6f 6e 3a 72 65 6c 61 74 69 76 65 7d 23 67 62 6d 70 69 2c 23 67 62 6d 70 69 64 2c 23 67 62 6d 70 69 77 7b 2a 64 69 73 70 6c 61 79 3a 69 6e 6c 69 6e 65 7d 23 67 62 67 35 7b 66 6f 6e 74 2d 73 69 7a 65 3a 30 7d 23 67 62 67 73 35 7b 70
                      Data Ascii: osition:relative}#gbmpi,#gbmpid,#gbmpiw{*display:inline}#gbg5{font-size:0}#gbgs5{padding:5px !important}.gbto #gbgs5{padding:7px 5px 6px !important}#gbi5{background:url(https://ssl.gstatic.com/gb/images/b_8d5afc09.png);_background:url(https://
                      Jul 1, 2024 08:28:58.071763039 CEST104INData Raw: 6e 65 3a 30 20 73 6f 6c 69 64 20 62 6c 61 63 6b 3b 74 65 78 74 2d 64 65 63 6f 72 61 74 69 6f 6e 3a 6e 6f 6e 65 20 21 69 6d 70 6f 72 74 61 6e 74 7d 2e 67 62 6d 30 6c 2c 2e 67 62 6d 30 6c 3a 76 69 73 69 74 65 64 7b 63 6f 6c 6f 72 3a 23 30 30 30 20
                      Data Ascii: ne:0 solid black;text-decoration:none !important}.gbm0l,.gbm0l:visited{color:#000 !important;font-weight
                      Jul 1, 2024 08:28:58.076615095 CEST1236INData Raw: 3a 62 6f 6c 64 7d 2e 67 62 6d 68 7b 62 6f 72 64 65 72 2d 74 6f 70 3a 31 70 78 20 73 6f 6c 69 64 20 23 62 65 62 65 62 65 3b 66 6f 6e 74 2d 73 69 7a 65 3a 30 3b 6d 61 72 67 69 6e 3a 31 30 70 78 20 30 7d 23 67 62 64 34 20 2e 67 62 6d 63 7b 62 61 63
                      Data Ascii: :bold}.gbmh{border-top:1px solid #bebebe;font-size:0;margin:10px 0}#gbd4 .gbmc{background:#f5f5f5;padding-top:0}#gbd4 .gbsbic::-webkit-scrollbar-track:vertical{background-color:#f5f5f5;margin-top:2px}#gbmpdv{background:#fff;border-bottom:1px s


                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:0
                      Start time:02:26:57
                      Start date:01/07/2024
                      Path:C:\Users\user\Desktop\K59gVXTgGv.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\K59gVXTgGv.exe"
                      Imagebase:0xa70000
                      File size:1'735'048 bytes
                      MD5 hash:B7CA45674C6B8A24A6A71315E0E51397
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000000.00000002.2386535902.0000000003146000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_DarkTortilla, Description: Yara detected DarkTortilla Crypter, Source: 00000000.00000002.2386535902.0000000003146000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.2386535902.0000000003146000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: 00000000.00000002.2386535902.0000000003146000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                      • Rule: njrat1, Description: Identify njRat, Source: 00000000.00000002.2386535902.0000000003146000.00000004.00000800.00020000.00000000.sdmp, Author: Brian Wallace @botnet_hunter
                      • Rule: JoeSecurity_DarkTortilla, Description: Yara detected DarkTortilla Crypter, Source: 00000000.00000002.2390410734.0000000006900000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_DarkTortilla, Description: Yara detected DarkTortilla Crypter, Source: 00000000.00000002.2388229518.00000000040D5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000000.00000002.2386535902.0000000002F37000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_DarkTortilla, Description: Yara detected DarkTortilla Crypter, Source: 00000000.00000002.2386535902.0000000002F37000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.2386535902.0000000002F37000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: 00000000.00000002.2386535902.0000000002F37000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                      • Rule: njrat1, Description: Identify njRat, Source: 00000000.00000002.2386535902.0000000002F37000.00000004.00000800.00020000.00000000.sdmp, Author: Brian Wallace @botnet_hunter
                      • Rule: JoeSecurity_DarkTortilla, Description: Yara detected DarkTortilla Crypter, Source: 00000000.00000002.2386535902.0000000002E6F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000000.00000002.2388229518.0000000003FEA000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000000.00000002.2388229518.0000000003FEA000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_DarkTortilla, Description: Yara detected DarkTortilla Crypter, Source: 00000000.00000002.2388229518.0000000003FEA000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_StormKitty, Description: Yara detected StormKitty Stealer, Source: 00000000.00000002.2388229518.0000000003FEA000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2388229518.0000000003FEA000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.2388229518.0000000003FEA000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: 00000000.00000002.2388229518.0000000003FEA000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                      • Rule: RAT_njRat, Description: Detects njRAT, Source: 00000000.00000002.2388229518.0000000003FEA000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                      • Rule: njrat1, Description: Identify njRat, Source: 00000000.00000002.2388229518.0000000003FEA000.00000004.00000800.00020000.00000000.sdmp, Author: Brian Wallace @botnet_hunter
                      • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000000.00000002.2388229518.0000000003FEA000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                      • Rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex, Description: Detects executables referencing Discord tokens regular expressions, Source: 00000000.00000002.2388229518.0000000003FEA000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                      • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000000.00000002.2388229518.0000000003EE0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000000.00000002.2388229518.0000000003EE0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_DarkTortilla, Description: Yara detected DarkTortilla Crypter, Source: 00000000.00000002.2388229518.0000000003EE0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_StormKitty, Description: Yara detected StormKitty Stealer, Source: 00000000.00000002.2388229518.0000000003EE0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2388229518.0000000003EE0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.2388229518.0000000003EE0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: 00000000.00000002.2388229518.0000000003EE0000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                      • Rule: RAT_njRat, Description: Detects njRAT, Source: 00000000.00000002.2388229518.0000000003EE0000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                      • Rule: njrat1, Description: Identify njRat, Source: 00000000.00000002.2388229518.0000000003EE0000.00000004.00000800.00020000.00000000.sdmp, Author: Brian Wallace @botnet_hunter
                      • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000000.00000002.2388229518.0000000003EE0000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                      • Rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex, Description: Detects executables referencing Discord tokens regular expressions, Source: 00000000.00000002.2388229518.0000000003EE0000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                      Reputation:low
                      Has exited:true

                      Target ID:4
                      Start time:02:27:34
                      Start date:01/07/2024
                      Path:C:\Windows\SysWOW64\cmd.exe
                      Wow64 process (32bit):true
                      Commandline:"cmd" /c ping 127.0.0.1 -n 43 > nul && copy "C:\Users\user\Desktop\K59gVXTgGv.exe" "C:\Program Files (x86)\Google Chrome sandbox.exe.exe" && ping 127.0.0.1 -n 43 > nul && "C:\Program Files (x86)\Google Chrome sandbox.exe.exe"
                      Imagebase:0x790000
                      File size:236'544 bytes
                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:false

                      Target ID:5
                      Start time:02:27:34
                      Start date:01/07/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff6d64d0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:false

                      Target ID:6
                      Start time:02:27:34
                      Start date:01/07/2024
                      Path:C:\Windows\SysWOW64\PING.EXE
                      Wow64 process (32bit):true
                      Commandline:ping 127.0.0.1 -n 43
                      Imagebase:0x7d0000
                      File size:18'944 bytes
                      MD5 hash:B3624DD758CCECF93A1226CEF252CA12
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:moderate
                      Has exited:true

                      Target ID:9
                      Start time:02:28:15
                      Start date:01/07/2024
                      Path:C:\Windows\SysWOW64\PING.EXE
                      Wow64 process (32bit):true
                      Commandline:ping 127.0.0.1 -n 43
                      Imagebase:0x7d0000
                      File size:18'944 bytes
                      MD5 hash:B3624DD758CCECF93A1226CEF252CA12
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:moderate
                      Has exited:true

                      Target ID:10
                      Start time:02:28:56
                      Start date:01/07/2024
                      Path:C:\Program Files (x86)\Google Chrome sandbox.exe.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Program Files (x86)\Google Chrome sandbox.exe.exe"
                      Imagebase:0x330000
                      File size:1'735'048 bytes
                      MD5 hash:B7CA45674C6B8A24A6A71315E0E51397
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Antivirus matches:
                      • Detection: 100%, Avira
                      • Detection: 100%, Joe Sandbox ML
                      • Detection: 68%, ReversingLabs
                      Reputation:low
                      Has exited:false

                      Reset < >

                        Execution Graph

                        Execution Coverage:16.7%
                        Dynamic/Decrypted Code Coverage:100%
                        Signature Coverage:0%
                        Total number of Nodes:143
                        Total number of Limit Nodes:5
                        execution_graph 74478 820cbb0 74479 820cd3b 74478->74479 74480 820cbd6 74478->74480 74480->74479 74483 820ce30 PostMessageW 74480->74483 74485 820ce28 PostMessageW 74480->74485 74484 820ce9c 74483->74484 74484->74480 74486 820ce9c 74485->74486 74486->74480 74487 698c1b8 74488 698c1fe 74487->74488 74493 698c3f8 74488->74493 74500 698c387 74488->74500 74504 698c398 74488->74504 74489 698c2eb 74494 698c3ff DuplicateHandle 74493->74494 74495 698c396 74493->74495 74499 698c496 74494->74499 74497 698c3c6 74495->74497 74507 698b690 74495->74507 74497->74489 74499->74489 74501 698c396 74500->74501 74502 698c3c6 74501->74502 74503 698b690 DuplicateHandle 74501->74503 74502->74489 74503->74502 74505 698b690 DuplicateHandle 74504->74505 74506 698c3c6 74505->74506 74506->74489 74508 698c400 DuplicateHandle 74507->74508 74509 698c496 74508->74509 74509->74497 74537 6c00cf0 74538 6c00d03 74537->74538 74542 6981e9c 74537->74542 74546 698766f 74537->74546 74550 6987640 74537->74550 74544 6981ea7 74542->74544 74543 6987981 74543->74538 74544->74543 74554 698bee0 74544->74554 74547 69876bb 74546->74547 74548 6987981 74547->74548 74549 698bee0 3 API calls 74547->74549 74548->74538 74549->74548 74552 6987645 74550->74552 74551 6987981 74551->74538 74552->74551 74553 698bee0 3 API calls 74552->74553 74553->74551 74555 698bf11 74554->74555 74556 698bf35 74555->74556 74559 698c08f 74555->74559 74563 698c0a0 74555->74563 74556->74543 74561 698c0ad 74559->74561 74560 698c0e7 74560->74556 74561->74560 74567 698b5c8 74561->74567 74565 698c0ad 74563->74565 74564 698c0e7 74564->74556 74565->74564 74566 698b5c8 3 API calls 74565->74566 74566->74564 74568 698b5d3 74567->74568 74570 698ce00 74568->74570 74571 698b6d0 74568->74571 74570->74570 74572 698b6db 74571->74572 74573 6981e9c 3 API calls 74572->74573 74574 698ce6f 74573->74574 74578 698e7c0 74574->74578 74584 698e7a8 74574->74584 74575 698cea9 74575->74570 74580 698e7f1 74578->74580 74581 698e8f1 74578->74581 74579 698e7fd 74579->74575 74580->74579 74590 698f3f0 74580->74590 74596 698f400 74580->74596 74581->74575 74585 698e7f1 74584->74585 74587 698e8f1 74584->74587 74586 698e7fd 74585->74586 74588 698f400 3 API calls 74585->74588 74589 698f3f0 3 API calls 74585->74589 74586->74575 74587->74575 74588->74587 74589->74587 74591 698f400 74590->74591 74592 698f4da 74591->74592 74602 6ad0838 74591->74602 74611 6ad0848 74591->74611 74616 6ad0823 74591->74616 74597 698f42b 74596->74597 74598 698f4da 74597->74598 74599 6ad0838 3 API calls 74597->74599 74600 6ad0848 3 API calls 74597->74600 74601 6ad0823 3 API calls 74597->74601 74599->74598 74600->74598 74601->74598 74603 6ad084e 74602->74603 74605 6ad0886 CreateWindowExW 74602->74605 74604 6ad087d 74603->74604 74609 6ad0838 2 API calls 74603->74609 74610 6ad0823 2 API calls 74603->74610 74627 6ad0898 74603->74627 74604->74592 74607 6ad09bc 74605->74607 74609->74604 74610->74604 74612 6ad087d 74611->74612 74613 6ad0898 CreateWindowExW 74611->74613 74614 6ad0838 3 API calls 74611->74614 74615 6ad0823 3 API calls 74611->74615 74612->74592 74613->74612 74614->74612 74615->74612 74617 6ad082a 74616->74617 74618 6ad0850 74616->74618 74617->74592 74619 6ad0854 74618->74619 74621 6ad0884 CreateWindowExW 74618->74621 74624 6ad0898 CreateWindowExW 74619->74624 74625 6ad0838 2 API calls 74619->74625 74626 6ad0823 2 API calls 74619->74626 74620 6ad087d 74620->74592 74623 6ad09bc 74621->74623 74624->74620 74625->74620 74626->74620 74628 6ad0900 CreateWindowExW 74627->74628 74630 6ad09bc 74628->74630 74630->74630 74510 6c4b920 74511 6c4b966 DeleteFileW 74510->74511 74513 6c4b99f 74511->74513 74514 6989e30 74517 6989f28 74514->74517 74515 6989e3f 74518 6989f39 74517->74518 74519 6989f5c 74517->74519 74518->74519 74525 698a1b0 74518->74525 74529 698a1c0 74518->74529 74519->74515 74520 6989f54 74520->74519 74521 698a160 GetModuleHandleW 74520->74521 74522 698a18d 74521->74522 74522->74515 74527 698a1c0 74525->74527 74526 698a1f9 74526->74520 74527->74526 74533 69899b8 74527->74533 74530 698a1d4 74529->74530 74531 69899b8 LoadLibraryExW 74530->74531 74532 698a1f9 74530->74532 74531->74532 74532->74520 74534 698a3a0 LoadLibraryExW 74533->74534 74536 698a419 74534->74536 74536->74526 74631 69820a0 74632 69820c5 74631->74632 74635 6981d3c 74632->74635 74634 69820d6 74636 6981d47 74635->74636 74639 6981e3c 74636->74639 74638 6984a55 74638->74634 74640 6981e47 74639->74640 74643 6981e6c 74640->74643 74642 6984b3a 74642->74638 74644 6981e77 74643->74644 74645 6981e9c 3 API calls 74644->74645 74646 6984c3c 74645->74646 74646->74642 74647 6ad2e50 74648 6ad2e92 74647->74648 74650 6ad2e99 74647->74650 74649 6ad2eea CallWindowProcW 74648->74649 74648->74650 74649->74650 74651 6ad7cd0 74652 6ad7cf2 74651->74652 74653 6981e9c 3 API calls 74651->74653 74654 698766f 3 API calls 74651->74654 74655 6987640 3 API calls 74651->74655 74653->74652 74654->74652 74655->74652
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2386460388.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d10000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID: (o]q$(o]q$(o]q$(o]q$(o]q$(o]q$(o]q$,aq$,aq
                        • API String ID: 0-99275883
                        • Opcode ID: 19bad34fd9e285bae58d4a0193f154115f99414dbd1740d4a2032f85f58400a9
                        • Instruction ID: 92af0ca45c610188b8f562843f10093d979cc96012b2ef3859f0da75b7e1303e
                        • Opcode Fuzzy Hash: 19bad34fd9e285bae58d4a0193f154115f99414dbd1740d4a2032f85f58400a9
                        • Instruction Fuzzy Hash: C8925B34A00609EFDB14CF68E984AAEBBF2FF48314F258555E8459B7A5D730ED41CB90
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2386460388.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d10000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID: (o]q$(o]q$(o]q$,aq$,aq$,aq$,aq$Haq
                        • API String ID: 0-2006068749
                        • Opcode ID: 40b6f92985ecc65b27a0a57e5d6de3f43a6c8bf6cd7ecd40365850d68f95cdf3
                        • Instruction ID: 40fbe1c47f2e7128d08243eefc10e61fc9d1861fb2f6785ed340778e3f36c198
                        • Opcode Fuzzy Hash: 40b6f92985ecc65b27a0a57e5d6de3f43a6c8bf6cd7ecd40365850d68f95cdf3
                        • Instruction Fuzzy Hash: F1A28174A00219AFCB14DF69D884AAEBBF6FF88304F158169E905DB7A5DB30DC41CB90

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1342 6c0c344-6c0f787 1345 6c0f935-6c0f986 1342->1345 1346 6c0f78d-6c0f793 1342->1346 1375 6c0f9a0-6c0f9ba 1345->1375 1376 6c0f988-6c0f995 1345->1376 1347 6c0f7d4-6c0f7e8 1346->1347 1348 6c0f795-6c0f79c 1346->1348 1352 6c0f80a-6c0f813 1347->1352 1353 6c0f7ea-6c0f7ee 1347->1353 1350 6c0f7b6-6c0f7cf call 6c0f1e0 1348->1350 1351 6c0f79e-6c0f7ab 1348->1351 1350->1347 1351->1350 1354 6c0f815-6c0f822 1352->1354 1355 6c0f82d-6c0f849 1352->1355 1353->1352 1356 6c0f7f0-6c0f7fc 1353->1356 1354->1355 1368 6c0f8f1-6c0f915 1355->1368 1369 6c0f84f-6c0f85a 1355->1369 1356->1352 1364 6c0f7fe-6c0f804 1356->1364 1364->1352 1382 6c0f917 1368->1382 1383 6c0f91f 1368->1383 1373 6c0f872-6c0f879 1369->1373 1374 6c0f85c-6c0f862 1369->1374 1380 6c0f87b-6c0f885 1373->1380 1381 6c0f88d-6c0f8b0 call 6c0afbc 1373->1381 1378 6c0f864 1374->1378 1379 6c0f866-6c0f868 1374->1379 1387 6c0fa01-6c0fa08 1375->1387 1388 6c0f9bc-6c0f9c3 1375->1388 1376->1375 1378->1373 1379->1373 1380->1381 1395 6c0f8c1-6c0f8d2 1381->1395 1396 6c0f8b2-6c0f8bf 1381->1396 1382->1383 1383->1345 1393 6c0fa22-6c0fa2b 1387->1393 1394 6c0fa0a-6c0fa17 1387->1394 1391 6c0f9c5-6c0f9d2 1388->1391 1392 6c0f9dd-6c0f9f2 1388->1392 1391->1392 1392->1387 1407 6c0f9f4-6c0f9fb 1392->1407 1397 6c0fa31-6c0fa34 1393->1397 1398 6c0fa2d-6c0fa2f 1393->1398 1394->1393 1405 6c0f8df-6c0f8eb 1395->1405 1406 6c0f8d4-6c0f8d7 1395->1406 1396->1395 1396->1405 1399 6c0fa35-6c0fa39 1397->1399 1398->1399 1408 6c0fa41-6c0fa46 1399->1408 1405->1368 1405->1369 1406->1405 1407->1387 1409 6c0fa8f-6c0faba call 6c075d0 1407->1409 1410 6c0fa48-6c0fa4f 1408->1410 1411 6c0fa89-6c0fa8c 1408->1411 1422 6c0fac1 1409->1422 1414 6c0fa51-6c0fa5e 1410->1414 1415 6c0fa69-6c0fa7e 1410->1415 1414->1415 1415->1411 1420 6c0fa80-6c0fa87 1415->1420 1420->1411 1420->1422 1423 6c0fac4-6c0fb01 call 6c075d0 1422->1423 1432 6c0fb03-6c0fb22 1423->1432 1434 6c0fb24-6c0fb37 1432->1434 1435 6c0fb3a-6c0fb40 1432->1435 1436 6c0fbb0-6c0fc08 1435->1436 1437 6c0fb42-6c0fb49 1435->1437 1439 6c0fc0f-6c0fc67 1436->1439 1437->1439 1440 6c0fb4f-6c0fb5f 1437->1440 1446 6c0fc6e-6c0fd15 1439->1446 1445 6c0fb65-6c0fb69 1440->1445 1440->1446 1448 6c0fb6c-6c0fb6e 1445->1448 1482 6c0fd1c-6c0fd59 1446->1482 1451 6c0fb70-6c0fb80 1448->1451 1452 6c0fb93-6c0fb95 1448->1452 1460 6c0fb82-6c0fb91 1451->1460 1461 6c0fb6b 1451->1461 1454 6c0fba4-6c0fbad 1452->1454 1455 6c0fb97-6c0fba1 1452->1455 1460->1452 1460->1461 1461->1448 1487 6c0fd5b-6c0fd7c 1482->1487 1489 6c0fdce-6c0fe26 1487->1489 1490 6c0fd7e-6c0fd8e 1487->1490 1494 6c0fe2d-6c0ff1c 1489->1494 1493 6c0fd94-6c0fd98 1490->1493 1490->1494 1496 6c0fd9b-6c0fd9d 1493->1496 1497 6c0fdb1-6c0fdb3 1496->1497 1498 6c0fd9f-6c0fdaf 1496->1498 1500 6c0fdc2-6c0fdcb 1497->1500 1501 6c0fdb5-6c0fdbf 1497->1501 1498->1497 1505 6c0fd9a 1498->1505 1505->1496
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID: (aq$Haq$Haq$Haq$PH]q
                        • API String ID: 0-1859950085
                        • Opcode ID: 85bb6e8434d6c54c91314982776a96a89af8e494bd97249e2a00e40067998330
                        • Instruction ID: 5cebccdf2dcdf53ed3bc41d22debc4278a4c31c7cdb5ad9e9dec6b0f9f3c9943
                        • Opcode Fuzzy Hash: 85bb6e8434d6c54c91314982776a96a89af8e494bd97249e2a00e40067998330
                        • Instruction Fuzzy Hash: 5922BF70B002158FDB64EB38C85476E7BA2AF88710F24856DE55ADB3E1CE34DD82CB91

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1528 8200040-820007e 1529 8200080-8200087 1528->1529 1530 82000a3-82000c0 1528->1530 1531 820093d-8200948 1529->1531 1532 820008d-8200098 1529->1532 1536 82000c2-82000c8 1530->1536 1537 82000cb-82000dc 1530->1537 1539 820094f-82009c3 1531->1539 1532->1530 1536->1537 1540 82000e2-82000f2 1537->1540 1541 820018a-82001ad 1537->1541 1588 82009ca-8200a36 1539->1588 1545 82000f4-820010d 1540->1545 1546 820014f-8200152 1540->1546 1548 82001b3-82001c0 1541->1548 1549 82003fa-8200427 1541->1549 1560 8200113-8200118 1545->1560 1561 8200a3d-8200a60 1545->1561 1550 8200160-8200172 1546->1550 1551 8200154-820015b 1546->1551 1548->1549 1556 82001c6-82001cc 1548->1556 1557 820050d-8200533 call 895f340 1549->1557 1558 820042d-820043b 1549->1558 1550->1561 1565 8200178-8200185 1550->1565 1551->1549 1563 82001d2-82001de 1556->1563 1564 82001ce-82001d0 1556->1564 1567 8200538 1557->1567 1558->1557 1576 8200441-820044e 1558->1576 1560->1549 1566 820011e-820014a 1560->1566 1571 8200a62-8200a67 1561->1571 1572 8200a69-8200a77 1561->1572 1568 82001e0-82001ef 1563->1568 1564->1568 1565->1549 1566->1549 1573 820092e-8200935 1567->1573 1568->1539 1583 82001f5-82001f9 1568->1583 1579 8200adb-8200add 1571->1579 1586 8200a79-8200a89 1572->1586 1587 8200acf-8200ad4 1572->1587 1590 8200454-8200457 1576->1590 1591 8200938 1576->1591 1583->1588 1589 82001ff-8200206 1583->1589 1586->1587 1593 8200a8b-8200a9b 1586->1593 1587->1579 1588->1561 1589->1588 1595 820020c-8200213 1589->1595 1590->1591 1596 820045d-820047a 1590->1596 1591->1531 1593->1587 1597 8200a9d-8200aad 1593->1597 1598 8200308-820030f 1595->1598 1599 8200219-8200220 1595->1599 1615 820047c-8200482 1596->1615 1616 82004bd-82004e7 1596->1616 1597->1587 1602 8200aaf-8200abd 1597->1602 1598->1549 1604 8200315-8200339 1598->1604 1599->1561 1605 8200226-8200241 1599->1605 1602->1587 1617 8200abf-8200ac5 1602->1617 1618 8200372-8200386 1604->1618 1619 820033b-8200341 1604->1619 1612 8200243-8200245 1605->1612 1613 8200247-8200261 1605->1613 1622 8200263-8200271 1612->1622 1613->1622 1615->1561 1623 8200488-820048e 1615->1623 1616->1573 1654 82004ed-82004f9 1616->1654 1624 8200ac7 1617->1624 1625 8200ac9 1617->1625 1638 8200388 1618->1638 1639 820038a-8200396 1618->1639 1620 8200343-8200345 1619->1620 1621 8200347-8200353 1619->1621 1626 8200355-820035e 1620->1626 1621->1626 1631 8200273-8200282 1622->1631 1632 8200296-82002c6 1622->1632 1629 8200490-8200493 1623->1629 1630 82004a1-82004a9 1623->1630 1634 8200acb-8200acd 1624->1634 1625->1634 1626->1618 1651 8200360-8200370 1626->1651 1629->1561 1637 8200499-820049f 1629->1637 1645 82004b0-82004b3 1630->1645 1631->1632 1653 8200284-8200294 1631->1653 1634->1587 1640 8200ad6 1634->1640 1637->1645 1648 8200398-82003aa 1638->1648 1639->1648 1640->1579 1645->1591 1652 82004b9-82004bb 1645->1652 1658 82003e4-82003f7 1648->1658 1651->1618 1665 82003ac-82003e2 1651->1665 1652->1615 1652->1616 1653->1632 1666 82002c9-8200305 1653->1666 1654->1557 1662 82004fb 1654->1662 1658->1549 1662->1573 1665->1658
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391690287.0000000008200000.00000040.00000800.00020000.00000000.sdmp, Offset: 08200000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_8200000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID: ,baq$@b]q$]$$]q$;]q
                        • API String ID: 0-3197633098
                        • Opcode ID: 880ce4b1a027b150dbddddb119b5ee7879c8dff8ca9754ae3de462f01b731732
                        • Instruction ID: 7b44beb50823b39d2deb80302c4a2c972c699660e940f56fa878f4a6b066154e
                        • Opcode Fuzzy Hash: 880ce4b1a027b150dbddddb119b5ee7879c8dff8ca9754ae3de462f01b731732
                        • Instruction Fuzzy Hash: D4026134B10619CFEB14DF69C894B6E7BA2AF89711F158099E9499B392CF30DC82CF51

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1987 8953017-8953020 1988 8953022-895322b 1987->1988 1989 895300d-8953013 1987->1989 2013 8953232 1988->2013 1989->1987 2014 895323a-895325f 2013->2014 2017 8953265-8953faa 2014->2017 2018 89552b4-895559a 2014->2018 2426 8954296-89552ac 2017->2426 2427 8953fb0-895428e 2017->2427 2093 89555a0-895654b 2018->2093 2094 8956553-89575ce 2018->2094 2093->2094 2684 8957915-8957928 2094->2684 2685 89575d4-895790d 2094->2685 2426->2018 2427->2426 2689 8957fd5-8958e91 2684->2689 2690 895792e-8957fcd 2684->2690 2685->2684 3070 8958e98-8958eae call 895a966 2689->3070 2690->2689 3072 8958eb4-8958ebb 3070->3072
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391875024.0000000008950000.00000040.00000800.00020000.00000000.sdmp, Offset: 08950000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_8950000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 6e9b9bb3222e094859fde1bc6fa7e7d665e1e9a0067a4f2abe8974cbac9b3b01
                        • Instruction ID: 8f40f7d9126ba64de19a2bfa243692f94953a4809aca0f705b3ec4761bfcc9db
                        • Opcode Fuzzy Hash: 6e9b9bb3222e094859fde1bc6fa7e7d665e1e9a0067a4f2abe8974cbac9b3b01
                        • Instruction Fuzzy Hash: C5C31B70A15228CFDB54FF79E9886ACBBF2EB89600F0145E9E449A3354DB345E85CF42

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 3074 8953030-895325f 3102 8953265-8953faa 3074->3102 3103 89552b4-895559a 3074->3103 3511 8954296-89552ac 3102->3511 3512 8953fb0-895428e 3102->3512 3178 89555a0-895654b 3103->3178 3179 8956553-89575ce 3103->3179 3178->3179 3769 8957915-8957928 3179->3769 3770 89575d4-895790d 3179->3770 3511->3103 3512->3511 3774 8957fd5-8958eae call 895a966 3769->3774 3775 895792e-8957fcd 3769->3775 3770->3769 4157 8958eb4-8958ebb 3774->4157 3775->3774
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391875024.0000000008950000.00000040.00000800.00020000.00000000.sdmp, Offset: 08950000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_8950000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b9a96c015997728ee6bf2a3b3fb984318349ae30bb739aee4eb57ff859a5af32
                        • Instruction ID: 3b612b1bc3daf2e6b3a37b70fa64373834b93205bdbbab09a2ed027a5dadd646
                        • Opcode Fuzzy Hash: b9a96c015997728ee6bf2a3b3fb984318349ae30bb739aee4eb57ff859a5af32
                        • Instruction Fuzzy Hash: BEC31B70A15228CFDB54FF79E9886ACBBF2EB89600F0145E9E449A3354DB345E85CF42

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 4159 6c44018-6c496e3 call 6c4ae41 5114 6c496e9-6c496f0 4159->5114
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391190168.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c40000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b31831baa29566cb89e526bca572f7602a0a3cc211cef7f543b4151a5fd2e64f
                        • Instruction ID: 3b4560fdb6158c25ff7d3ee9d3713332c7e5c669048c416ea37bc18d10668adb
                        • Opcode Fuzzy Hash: b31831baa29566cb89e526bca572f7602a0a3cc211cef7f543b4151a5fd2e64f
                        • Instruction Fuzzy Hash: A1B31A74A112288BCB54FF79E98826CBBF2FB88700F4589E9D489A3254EF345D85CF45
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391875024.0000000008950000.00000040.00000800.00020000.00000000.sdmp, Offset: 08950000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_8950000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID: $]q$$]q
                        • API String ID: 0-127220927
                        • Opcode ID: ada8e009753aa5b4353bf891e43421b9587490fb5669bad85c4b466e9b769ed3
                        • Instruction ID: cefdf2db6c725d076e0767a3e5765553b4585b81f8fe860ff2b11c9459879d1e
                        • Opcode Fuzzy Hash: ada8e009753aa5b4353bf891e43421b9587490fb5669bad85c4b466e9b769ed3
                        • Instruction Fuzzy Hash: 7672A170E142298BDB68BFB8D98476D7BB2EF88604F4149A9E44DB3340EF385D45CB52
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2386460388.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d10000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID: 8aq$8aq
                        • API String ID: 0-1589283582
                        • Opcode ID: 726cb16236477338a2d0c1c0e7f2232522a21da05e962178e61f1276152fbfa7
                        • Instruction ID: 0070c78090508dac09c9e41d434d1e1e466324e2e0625e64cb3ea04813f83b1a
                        • Opcode Fuzzy Hash: 726cb16236477338a2d0c1c0e7f2232522a21da05e962178e61f1276152fbfa7
                        • Instruction Fuzzy Hash: CEB1BF74E01229CFDB14DFA9D944B9DBBB2BF89300F2085A9D549AB354DB30AE85CF40
                        Memory Dump Source
                        • Source File: 00000000.00000002.2390700943.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6980000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4077a5b2a27af14f82ab62bb84d31a381cffe1a835218238c5aeadfd4bc6bd61
                        • Instruction ID: b0088c89f5aae74fb83476de7f80f04f4b6a3baa6c54eb6d1adc89b42a78b1be
                        • Opcode Fuzzy Hash: 4077a5b2a27af14f82ab62bb84d31a381cffe1a835218238c5aeadfd4bc6bd61
                        • Instruction Fuzzy Hash: BAB24B70A1422A8FCB58FF78D9886ADBBB2EF88704F4145E9D449A3354DB386D85CF41
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391690287.0000000008200000.00000040.00000800.00020000.00000000.sdmp, Offset: 08200000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_8200000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 431ebf215913787495baf581f2e86d9f37c5336a0e0b6590a5ca44a42ce25d31
                        • Instruction ID: ba68fc8da09a2eacc8730571c831f15aa70fae1a9aebdd8fbe9aeaa60c48dba8
                        • Opcode Fuzzy Hash: 431ebf215913787495baf581f2e86d9f37c5336a0e0b6590a5ca44a42ce25d31
                        • Instruction Fuzzy Hash: 79420070A043158FCB05EBB9D88855DBFF2FF89204B45866EE049E7352DF389856CB52
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 0f405fadc8b867c494a50e6b19674c29cd6c510454afe754b0f27675dd235b3c
                        • Instruction ID: 8621a0ecbb25b225f5f01a886a2daefbb8c70cc564f460d54b23c1d057f6a07c
                        • Opcode Fuzzy Hash: 0f405fadc8b867c494a50e6b19674c29cd6c510454afe754b0f27675dd235b3c
                        • Instruction Fuzzy Hash: 09527D74A003468FCB54EF28C844B99B7B2FF85314F2186A9D5596F3A1DB71AD82CF81
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: a039666b54083ddd9a5b0bda8e360b385b8e8086b045d4ba0db524ac3dcc2f2e
                        • Instruction ID: f1c19c8c0e494250f9185e104fa6cc1a1e78570e3496819e3a2f21872acd8d00
                        • Opcode Fuzzy Hash: a039666b54083ddd9a5b0bda8e360b385b8e8086b045d4ba0db524ac3dcc2f2e
                        • Instruction Fuzzy Hash: 56528D34A003468FCB54EF28C844B99B7B2FF85314F2186A9D5596F3A1DB71AD82CF81
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391690287.0000000008200000.00000040.00000800.00020000.00000000.sdmp, Offset: 08200000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_8200000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: a3f89ae238902231f3453272395fbcb7ee0ff5ea0c913e3acfeb9d1f5cb1c615
                        • Instruction ID: 50da71cf31113b2bc23ee793e06e8de1335f950274d07958ef6cc133d69f5106
                        • Opcode Fuzzy Hash: a3f89ae238902231f3453272395fbcb7ee0ff5ea0c913e3acfeb9d1f5cb1c615
                        • Instruction Fuzzy Hash: 27228D71E103158FCB08EFB9D88855EBBF2FF89204B558A2DE049A7351EF389856CB51
                        Memory Dump Source
                        • Source File: 00000000.00000002.2386460388.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d10000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 51fd03f144af0cbed3f1d0b48d0f2105304e39e4aa6d1f8e19af9ecd7836c500
                        • Instruction ID: 7465bc8ca6229d8425e9d9248f0b844f3bbd7cef0bb0d3631345253510c66993
                        • Opcode Fuzzy Hash: 51fd03f144af0cbed3f1d0b48d0f2105304e39e4aa6d1f8e19af9ecd7836c500
                        • Instruction Fuzzy Hash: 1971E474E012199FDB04DFA9D994BEEBBF2BF88700F248529E414AB395D7349981CF90
                        Memory Dump Source
                        • Source File: 00000000.00000002.2386460388.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d10000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 21b06057417995f192c74abeb1df4d667631d7507ae14771e17aecafafe769c2
                        • Instruction ID: cb1c9b1b3ab0859a6fbe578a55bba67de7bfad6dae7c886c9822487c9e767cc7
                        • Opcode Fuzzy Hash: 21b06057417995f192c74abeb1df4d667631d7507ae14771e17aecafafe769c2
                        • Instruction Fuzzy Hash: 87F02436E44344EBEF118BA4DC51BECBF30EB4B310F200095E618BF6A1D226A857C700

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 6074 895d888-895dedf 6158 895dee5-895df00 6074->6158 6159 895e6da-895e6ee 6074->6159 6280 895df02 call 2d14a58 6158->6280 6281 895df02 call 2d14a68 6158->6281 6166 895e6ef 6159->6166 6161 895df07-895dfeb 6161->6159 6175 895dff1-895dff6 6161->6175 6166->6166 6176 895e120-895e68b call 895f7f0 6175->6176 6177 895dffc-895e0e1 6175->6177 6278 895e68d call 2d1b5e1 6176->6278 6279 895e68d call 2d1b898 6176->6279 6177->6159 6198 895e0e7-895e108 6177->6198 6198->6176 6206 895e10a-895e110 6198->6206 6207 895e114-895e116 6206->6207 6208 895e112 6206->6208 6207->6176 6208->6176 6274 895e692-895e6b9 6274->6159 6278->6274 6279->6274 6280->6161 6281->6161
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391875024.0000000008950000.00000040.00000800.00020000.00000000.sdmp, Offset: 08950000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_8950000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID: $]q$$]q$$]q
                        • API String ID: 0-182748909
                        • Opcode ID: d73829918fcc4a29618a1cff123d217039f811923c104f335e5f9a1df89e72e9
                        • Instruction ID: f0abe718d8498f25403517ce98dff9ef5a4aac12009413292217d197c726b56f
                        • Opcode Fuzzy Hash: d73829918fcc4a29618a1cff123d217039f811923c104f335e5f9a1df89e72e9
                        • Instruction Fuzzy Hash: F672A170E142298BDB68BFB8D98476D7BB2EF88604F4149A9E44DB3340EF385D45CB52

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 6283 2d1b898-2d1b8b7 6285 2d1ba1a-2d1ba3b 6283->6285 6286 2d1b8bd-2d1b8bf 6283->6286 6298 2d1ba3c-2d1ba8c 6285->6298 6287 2d1b8c1-2d1b8cb 6286->6287 6288 2d1b8fc-2d1b90e call 2d101e4 6286->6288 6293 2d1b8f5-2d1b8f7 6287->6293 6294 2d1b8cd-2d1b8f0 6287->6294 6300 2d1b910-2d1b919 6288->6300 6301 2d1b91b-2d1b91d 6288->6301 6296 2d1ba12-2d1ba17 6293->6296 6294->6296 6324 2d1ba8e-2d1ba9e 6298->6324 6300->6301 6303 2d1b92b-2d1b92d 6301->6303 6304 2d1b91f-2d1b929 6301->6304 6303->6296 6304->6303 6310 2d1b932-2d1b944 6304->6310 6317 2d1b946-2d1b958 6310->6317 6318 2d1b969-2d1b977 6310->6318 6317->6318 6331 2d1b95a-2d1b964 6317->6331 6322 2d1b980-2d1b98a 6318->6322 6323 2d1b979-2d1b97b 6318->6323 6332 2d1b9ba-2d1b9c4 6322->6332 6333 2d1b98c-2d1b996 6322->6333 6323->6296 6325 2d1baa0-2d1baa5 6324->6325 6326 2d1baa8-2d1baac 6324->6326 6325->6326 6329 2d1bab6-2d1baba 6326->6329 6330 2d1baae-2d1bab3 6326->6330 6334 2d1bac4-2d1bac6 6329->6334 6335 2d1babc-2d1bac1 6329->6335 6330->6329 6331->6296 6341 2d1b9c6-2d1b9d0 6332->6341 6342 2d1b9e9-2d1b9ef 6332->6342 6333->6332 6344 2d1b998-2d1b99e 6333->6344 6337 2d1bae0-2d1baf0 call 2d15278 6334->6337 6338 2d1bac8-2d1bade 6334->6338 6335->6334 6353 2d1baf5-2d1bb05 6337->6353 6338->6353 6341->6342 6356 2d1b9d2-2d1b9e7 call 2d11f88 6341->6356 6349 2d1b9f1-2d1b9fa call 2d153e8 6342->6349 6350 2d1ba08-2d1ba0a 6342->6350 6347 2d1b9a0 6344->6347 6348 2d1b9a2-2d1b9ae 6344->6348 6354 2d1b9b0-2d1b9b8 6347->6354 6348->6354 6349->6350 6361 2d1b9fc-2d1ba06 6349->6361 6350->6296 6363 2d1bb07-2d1bb10 call 2d15e68 6353->6363 6364 2d1bb2f-2d1bb3a call 2d153e8 6353->6364 6354->6296 6356->6296 6361->6296 6363->6364 6374 2d1bb12-2d1bb25 6363->6374 6372 2d1bb60-2d1bb78 call 2d1bb88 6364->6372 6373 2d1bb3c-2d1bb45 6364->6373 6376 2d1bb7e-2d1bb82 6372->6376 6373->6372 6375 2d1bb47-2d1bb5e 6373->6375 6380 2d1bb27 call 8200ae0 6374->6380 6381 2d1bb27 call 8200af0 6374->6381 6375->6376 6377 2d1bb2d 6377->6376 6380->6377 6381->6377
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2386460388.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d10000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID: Haq$$]q$$]q
                        • API String ID: 0-1533201563
                        • Opcode ID: 9ae5b79e1357d1837b1b257463a94b7ba029a5cd349a564b91aada5835d0afa5
                        • Instruction ID: 513597f7aca054b2af4836cf334d6be8e9f9cc222552cddbb544f5fee8c3176f
                        • Opcode Fuzzy Hash: 9ae5b79e1357d1837b1b257463a94b7ba029a5cd349a564b91aada5835d0afa5
                        • Instruction Fuzzy Hash: 4481B130704215AFCB09AF79A49967E3EE7EF88648B14402AE946C7795DF34CC12DB91

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 6382 89505a0-89505c5 6383 8950719-895073e 6382->6383 6384 89505cb-89505cd 6382->6384 6385 8950745-8950756 6383->6385 6384->6385 6386 89505d3-89505dc 6384->6386 6397 8950759-8950795 6385->6397 6388 89505ef-8950616 6386->6388 6389 89505de-89505ec 6386->6389 6391 895061c-895062e 6388->6391 6392 895069f-89506a3 6388->6392 6389->6388 6391->6392 6406 8950630-8950683 6391->6406 6394 89506a5-89506d0 6392->6394 6395 89506da-89506f3 6392->6395 6436 89506d2 call 8950800 6394->6436 6437 89506d2 call 8950590 6394->6437 6438 89506d2 call 89505a0 6394->6438 6439 89506d2 call 8950700 6394->6439 6440 89506d2 call 8950718 6394->6440 6400 89506f5 6395->6400 6401 89506fd-89506fe 6395->6401 6417 8950797-89507ab 6397->6417 6400->6401 6401->6383 6406->6392 6413 8950685-8950698 6406->6413 6412 89506d7 6412->6395 6413->6392 6418 89507b7-895088c 6417->6418 6419 89507ad-89507b6 6417->6419 6426 8950892-89508a0 6418->6426 6427 89508a2-89508a8 6426->6427 6428 89508a9-89508e1 6426->6428 6427->6428 6432 89508f1 6428->6432 6433 89508e3-89508e7 6428->6433 6435 89508f2 6432->6435 6433->6432 6434 89508e9 6433->6434 6434->6432 6435->6435 6436->6412 6437->6412 6438->6412 6439->6412 6440->6412
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391875024.0000000008950000.00000040.00000800.00020000.00000000.sdmp, Offset: 08950000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_8950000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID: (aq$(aq$(aq
                        • API String ID: 0-2593664646
                        • Opcode ID: 849d41f9e717a8984b3988bf928f9cf5c878b223000a22dc2d7fc3e38682d9cf
                        • Instruction ID: 37d0b40c762f882693156467d64f2daacd803dc49052c18924fc061b3f9f4122
                        • Opcode Fuzzy Hash: 849d41f9e717a8984b3988bf928f9cf5c878b223000a22dc2d7fc3e38682d9cf
                        • Instruction Fuzzy Hash: A3A19070E007099FCB14EFA9C85469EBBF5FF89310F14856DE805AB391DB709985CBA1

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 6441 2d1bc18-2d1bc4a 6442 2d1bc60-2d1bc6b 6441->6442 6443 2d1bc4c-2d1bc50 6441->6443 6446 2d1bc71-2d1bc73 6442->6446 6447 2d1bd0f-2d1bd3b 6442->6447 6444 2d1bc52-2d1bc5e 6443->6444 6445 2d1bc78-2d1bc7f 6443->6445 6444->6442 6444->6445 6449 2d1bc81-2d1bc88 6445->6449 6450 2d1bc9f-2d1bcb1 call 2d15b28 6445->6450 6448 2d1bd07-2d1bd0c 6446->6448 6455 2d1bd42-2d1bd98 6447->6455 6449->6450 6453 2d1bc8a-2d1bc95 6449->6453 6457 2d1bcb3-2d1bcb7 6450->6457 6458 2d1bcb9-2d1bcc1 6450->6458 6453->6455 6456 2d1bc9b-2d1bc9d 6453->6456 6477 2d1bda4-2d1bdc6 6455->6477 6478 2d1bd9a-2d1bd9f 6455->6478 6456->6448 6457->6458 6460 2d1bcd3-2d1bcf1 call 2d161f8 6457->6460 6461 2d1bcc3-2d1bcca call 2d15b28 6458->6461 6462 2d1bccf-2d1bcd1 6458->6462 6470 2d1bcf3-2d1bcfe call 2d17a98 6460->6470 6471 2d1bd05 6460->6471 6461->6462 6462->6448 6474 2d1bd03 6470->6474 6471->6448 6474->6448 6482 2d1bdd3-2d1bdd5 6477->6482 6483 2d1bdc8-2d1bdd1 6477->6483 6479 2d1beb1-2d1beb8 6478->6479 6509 2d1bdd7 call 2d1bed0 6482->6509 6510 2d1bdd7 call 2d1bec0 6482->6510 6483->6482 6485 2d1bddd-2d1bde6 6486 2d1be59-2d1be77 6485->6486 6487 2d1bde8-2d1bdf7 6485->6487 6507 2d1be79 call 2d1c0c0 6486->6507 6508 2d1be79 call 2d1bf79 6486->6508 6490 2d1be03-2d1be0f 6487->6490 6491 2d1bdf9-2d1bdfe 6487->6491 6496 2d1be11-2d1be15 6490->6496 6497 2d1be17-2d1be1b 6490->6497 6491->6479 6492 2d1be7f-2d1be83 6494 2d1be85-2d1be87 6492->6494 6495 2d1be89 6492->6495 6494->6495 6498 2d1be8b-2d1bea8 6494->6498 6495->6479 6496->6486 6496->6497 6499 2d1be55-2d1be57 6497->6499 6500 2d1be1d-2d1be21 6497->6500 6498->6479 6499->6479 6501 2d1be23-2d1be39 6500->6501 6502 2d1be3b-2d1be4c 6500->6502 6501->6499 6502->6499 6507->6492 6508->6492 6509->6485 6510->6485
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2386460388.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d10000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID: 4']q$Haq$Haq
                        • API String ID: 0-1526952785
                        • Opcode ID: 175b3dd961cbb35f8bc85d3bb6249e60727624eeb2fbf2956ad029af81efcf7d
                        • Instruction ID: 3d4731a1ac5f148bacd796ba29035d67d8b657c6e418785a1cc55956d1525f48
                        • Opcode Fuzzy Hash: 175b3dd961cbb35f8bc85d3bb6249e60727624eeb2fbf2956ad029af81efcf7d
                        • Instruction Fuzzy Hash: 13818D75600215AFCB159F68E848BAE7BB2FF88318F154466F946DB3A0DB34DC41CBA1
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391875024.0000000008950000.00000040.00000800.00020000.00000000.sdmp, Offset: 08950000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_8950000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID: Haq$Haq
                        • API String ID: 0-4016896955
                        • Opcode ID: c75af0c5c448131dbcaa7b2c36c77451874b3b8b6d12ffc1df582627c7e4a962
                        • Instruction ID: 09e268396a8fcd469f3f231dbeffab3e7ab1994221e3c8e141ef8d23c0e1ea40
                        • Opcode Fuzzy Hash: c75af0c5c448131dbcaa7b2c36c77451874b3b8b6d12ffc1df582627c7e4a962
                        • Instruction Fuzzy Hash: 23D1C170B142158BCB48BBB9D85426E7BB6FF89604F41496DD44AE3390EF388C16C7A6
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID: PH]q$PH]q
                        • API String ID: 0-1166926398
                        • Opcode ID: cfcd28b2d14bcfec6396073fe9c29754b409f230d6bd81383b98e9b6cecde46b
                        • Instruction ID: 4d6eebc47235741a81e09426dc5b9ebc6310d8bfc5075b0bd07d208e5f46efa7
                        • Opcode Fuzzy Hash: cfcd28b2d14bcfec6396073fe9c29754b409f230d6bd81383b98e9b6cecde46b
                        • Instruction Fuzzy Hash: EAC12874A00215CFDB54DF68D994AAD7BF2FF88310B2546A8E416EB3A1DB31ED41CB50
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2386460388.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d10000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID: Haq$Haq
                        • API String ID: 0-4016896955
                        • Opcode ID: 337f05d511cfc24ac486fc961ad05216ae180577fdd7f28650a0ec0396260d16
                        • Instruction ID: 3748dd1cf497e2cad19d8ee94ff9e5a19e1eacf9d5ba9376ed490d3eb6a61349
                        • Opcode Fuzzy Hash: 337f05d511cfc24ac486fc961ad05216ae180577fdd7f28650a0ec0396260d16
                        • Instruction Fuzzy Hash: BBA1AF74700219AFCB04AF68E898B6E7BA6BBC8701F548528F906DB781DF74DC51CB91
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID: (aq$Haq
                        • API String ID: 0-3785302501
                        • Opcode ID: d922741446741eefaceda406931d368c426652987055f3787492413b6f555569
                        • Instruction ID: 946bebab8b6460aacc2be84408cb80af76d0e55fdc74de21513c25f275fbd9e7
                        • Opcode Fuzzy Hash: d922741446741eefaceda406931d368c426652987055f3787492413b6f555569
                        • Instruction Fuzzy Hash: 8B513334A04251DFD759AF2CC0546BEBBA2EF85310F1885AED44ADB391CB34A982CB91
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391875024.0000000008950000.00000040.00000800.00020000.00000000.sdmp, Offset: 08950000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_8950000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID: TJbq$Te]q
                        • API String ID: 0-3147309840
                        • Opcode ID: 7382bfde6ae6d5a348d8868d0ca3b91d039adf8c953f09a8a39e61fcb8dbd864
                        • Instruction ID: a1dc681d465805444db4e27f6c901f33ba9cf5a0699e5466247c897053490e4c
                        • Opcode Fuzzy Hash: 7382bfde6ae6d5a348d8868d0ca3b91d039adf8c953f09a8a39e61fcb8dbd864
                        • Instruction Fuzzy Hash: 4031C7707182158FC709BBB8E894A2E7BF6EFC9614B01085DE449D7391DF389C0A8796
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391875024.0000000008950000.00000040.00000800.00020000.00000000.sdmp, Offset: 08950000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_8950000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID: TJbq$Te]q
                        • API String ID: 0-3147309840
                        • Opcode ID: ed9e412d3eff1eb249c996e688297cae42d0dd7d964f5d0ed982740c0f075555
                        • Instruction ID: af9526035e3d0af02f207392bb652c6020b5714fcf88c92189d3b8cbbaa61d41
                        • Opcode Fuzzy Hash: ed9e412d3eff1eb249c996e688297cae42d0dd7d964f5d0ed982740c0f075555
                        • Instruction Fuzzy Hash: 3821E4707141158BC708BBBDE898A2E7BE6EFC8604B41486CE44AE7390DF349C068796
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391875024.0000000008950000.00000040.00000800.00020000.00000000.sdmp, Offset: 08950000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_8950000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID: @
                        • API String ID: 0-2766056989
                        • Opcode ID: fe28e908e179c13b380b81caa3989de53e00e45ffcba46f75b824f88e1d2210a
                        • Instruction ID: 750411495e2e7b841bc5b795ff85ff61baf78adb38cf413dc434012921845ba4
                        • Opcode Fuzzy Hash: fe28e908e179c13b380b81caa3989de53e00e45ffcba46f75b824f88e1d2210a
                        • Instruction Fuzzy Hash: 2A62F030A183158FC705BB79E84812D7FF2EF89614F4649ADE489E7291DF388C4AC792
                        APIs
                        • GetModuleHandleW.KERNEL32(00000000), ref: 0698A17E
                        Memory Dump Source
                        • Source File: 00000000.00000002.2390700943.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6980000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID: HandleModule
                        • String ID:
                        • API String ID: 4139908857-0
                        • Opcode ID: bc9e80187b58614948f65c290d2a3fb4c4bb293903754183633bb179bb91be6e
                        • Instruction ID: a17f15b39544dd83f1b211ef1a885a789a5c5210a37a386dde2a13398a9886b9
                        • Opcode Fuzzy Hash: bc9e80187b58614948f65c290d2a3fb4c4bb293903754183633bb179bb91be6e
                        • Instruction Fuzzy Hash: 3A712570A00B058FD7A4EF6AD44476ABBF5FF88604F10892EE48AD7A40DB75E845CB91
                        Memory Dump Source
                        • Source File: 00000000.00000002.2390919207.0000000006AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6ad0000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 6ef56a3d09e9bffc29d07ac49de54165f17e1bd0b6d34c86271db67beeb66eb9
                        • Instruction ID: c06835a242a38427a6730961b79d630b1c75b1f705c90496f7849021d9ae5717
                        • Opcode Fuzzy Hash: 6ef56a3d09e9bffc29d07ac49de54165f17e1bd0b6d34c86271db67beeb66eb9
                        • Instruction Fuzzy Hash: 1D5113B1C00249AFDF16CF99C884ACEBFB6FF49300F14816AE919AB261D3719945CF91
                        Memory Dump Source
                        • Source File: 00000000.00000002.2390919207.0000000006AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6ad0000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: a334a574a8f83b0bae18cdb5f8f5cd3ba2f15d179bd7b406dec16e6d63bd85ee
                        • Instruction ID: ef585001b6af058be1c536213496ac9fde636799a04ce7433d7649a25bd5f65d
                        • Opcode Fuzzy Hash: a334a574a8f83b0bae18cdb5f8f5cd3ba2f15d179bd7b406dec16e6d63bd85ee
                        • Instruction Fuzzy Hash: 2951F0B1C00249AFDF15CFA9C884ACEBFB6FF49300F15816AE919AB221D3719955CF91
                        APIs
                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 06AD09AA
                        Memory Dump Source
                        • Source File: 00000000.00000002.2390919207.0000000006AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6ad0000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID: CreateWindow
                        • String ID:
                        • API String ID: 716092398-0
                        • Opcode ID: 4724813b61d83941f697a4e8110e368a6515e34597be35d7200b3490976d5717
                        • Instruction ID: bd9cefce5e16ea16e12507ef108fa2aa41372ab6dcc54374e41dbc2dc46e3f9f
                        • Opcode Fuzzy Hash: 4724813b61d83941f697a4e8110e368a6515e34597be35d7200b3490976d5717
                        • Instruction Fuzzy Hash: 2541B2B5D10309DFDB14DF9AC884ADEBBB5FF88310F24812AE819AB210D7759945CF91
                        APIs
                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0698C3C6,?,?,?,?,?), ref: 0698C487
                        Memory Dump Source
                        • Source File: 00000000.00000002.2390700943.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6980000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID: DuplicateHandle
                        • String ID:
                        • API String ID: 3793708945-0
                        • Opcode ID: 148dc1e69997b45001119fa383b6c4a15bc2de422d4b9b12d0b564fef3d57858
                        • Instruction ID: efaf075c7b024e86d4efbef61a21613cf50b4942b22ac6fff1e004149f4a84cb
                        • Opcode Fuzzy Hash: 148dc1e69997b45001119fa383b6c4a15bc2de422d4b9b12d0b564fef3d57858
                        • Instruction Fuzzy Hash: 5841487A900249EFDB01DF99D844AEEBFF9FB88310F14801AE919A7320D3359954CFA1
                        APIs
                        • CallWindowProcW.USER32(?,?,?,?,?), ref: 06AD2F11
                        Memory Dump Source
                        • Source File: 00000000.00000002.2390919207.0000000006AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6ad0000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID: CallProcWindow
                        • String ID:
                        • API String ID: 2714655100-0
                        • Opcode ID: 6528c8415a61a9554cf1f3faf59903445d83c5c342d2c44e882c1e98ea146cce
                        • Instruction ID: a9e35e671cfcdfa5cfbbd2da3fea6d8469c7e149235e363df1591d6f1ba60012
                        • Opcode Fuzzy Hash: 6528c8415a61a9554cf1f3faf59903445d83c5c342d2c44e882c1e98ea146cce
                        • Instruction Fuzzy Hash: FB4158B89002059FCB54DF99C848B9ABBF5FF88310F24C499E51AAB321C774A945CFA0
                        APIs
                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0698C3C6,?,?,?,?,?), ref: 0698C487
                        Memory Dump Source
                        • Source File: 00000000.00000002.2390700943.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6980000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID: DuplicateHandle
                        • String ID:
                        • API String ID: 3793708945-0
                        • Opcode ID: 0170f387f5183e56b5b71bb1bee192e47b20af9a792dca9c616a18b782c7ebbf
                        • Instruction ID: 5ed750b5a07ba3accd7da785b1a82dd690dbcc58cf02d6d01f9a1b36ed534daf
                        • Opcode Fuzzy Hash: 0170f387f5183e56b5b71bb1bee192e47b20af9a792dca9c616a18b782c7ebbf
                        • Instruction Fuzzy Hash: 2C2107B5D00309DFDB10DFAAD484AEEBBF4EB48310F10841AE915A3310C375A944CFA5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2386460388.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d10000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID: (o]q
                        • API String ID: 0-794736227
                        • Opcode ID: 10b3943510209d26d6a081c7b61db7158a0439c224bbf8664e4a9807c32bba51
                        • Instruction ID: 43522177d2cf5af2d6459bc2cff3d2a0b8cba8f09399949c20ab5abf7a42f13c
                        • Opcode Fuzzy Hash: 10b3943510209d26d6a081c7b61db7158a0439c224bbf8664e4a9807c32bba51
                        • Instruction Fuzzy Hash: 1FC10875A00219DFDB14CFA8D984AADFBF2BF88314B258155E915AB7A1CB31EC41CB60
                        APIs
                        • DeleteFileW.KERNEL32(00000000), ref: 06C4B990
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391190168.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c40000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID: DeleteFile
                        • String ID:
                        • API String ID: 4033686569-0
                        • Opcode ID: 634667eb78ae3cdfb65c631a16258b3f0fa4a6e85a66eae48e762af2ab4bf323
                        • Instruction ID: 953e9279d0e8d188c7e2beac6235d632c055d14af30c1e6ad9bd5c16208e6621
                        • Opcode Fuzzy Hash: 634667eb78ae3cdfb65c631a16258b3f0fa4a6e85a66eae48e762af2ab4bf323
                        • Instruction Fuzzy Hash: 382133B5C0065A9FCB14DF9AD445B9EFBF4BB48320F11812AD819A7240D339AA44CFA6
                        APIs
                        • DeleteFileW.KERNEL32(00000000), ref: 06C4B990
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391190168.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c40000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID: DeleteFile
                        • String ID:
                        • API String ID: 4033686569-0
                        • Opcode ID: d7dbd803acc42a079a718f78f69d9643addb7df496734a9ea8d6fffffdb35183
                        • Instruction ID: 90ba00c3a6d44e0fdea5af4d588ce8bb1b97b53d85e9b49127729ea311e81f57
                        • Opcode Fuzzy Hash: d7dbd803acc42a079a718f78f69d9643addb7df496734a9ea8d6fffffdb35183
                        • Instruction Fuzzy Hash: 1F1144B1C0065A9FCB14DF9AD444B9EFBF4FF48320F11812AD819A7240D339AA44CFA5
                        APIs
                        • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,0698A1F9,00000800,00000000,00000000), ref: 0698A40A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2390700943.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6980000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID: LibraryLoad
                        • String ID:
                        • API String ID: 1029625771-0
                        • Opcode ID: 98015259f44829f472282f90af37491ff9810111f9fb60c87fb4e1c5909dc2ac
                        • Instruction ID: 14fdc5dedac534c6303709dd37517951ba695fe6e9556106624e69cdcce0cf5d
                        • Opcode Fuzzy Hash: 98015259f44829f472282f90af37491ff9810111f9fb60c87fb4e1c5909dc2ac
                        • Instruction Fuzzy Hash: 6F1129B6C003099FDB10DFAAD444ADEFBF8EB88310F11841AD519A7600C375A545CFA5
                        APIs
                        • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,0698A1F9,00000800,00000000,00000000), ref: 0698A40A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2390700943.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6980000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID: LibraryLoad
                        • String ID:
                        • API String ID: 1029625771-0
                        • Opcode ID: e084689f8f1013c0e69a8163b4ecc10837a8707c89a70e22fdc4e2dffbff76d1
                        • Instruction ID: 633510317b3ee2b51c1287840d5d7c976387baacf1894e0cfaf62503a28fee26
                        • Opcode Fuzzy Hash: e084689f8f1013c0e69a8163b4ecc10837a8707c89a70e22fdc4e2dffbff76d1
                        • Instruction Fuzzy Hash: AE11E4B6D00349DFDB10DF9AD448A9EFBF8EB89310F11842EE919A7600C375A945CFA5
                        APIs
                        • GetModuleHandleW.KERNEL32(00000000), ref: 0698A17E
                        Memory Dump Source
                        • Source File: 00000000.00000002.2390700943.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6980000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID: HandleModule
                        • String ID:
                        • API String ID: 4139908857-0
                        • Opcode ID: 91863b81c6355c8773fbe81a8e959b210e97e49577544f85fdaced8440510f2c
                        • Instruction ID: 80b9c1107002366e4f9feca7bdb38c417fc8bc98808f7f73aa08cb838ec47147
                        • Opcode Fuzzy Hash: 91863b81c6355c8773fbe81a8e959b210e97e49577544f85fdaced8440510f2c
                        • Instruction Fuzzy Hash: 2411E0B5C003498FCB10DF9AD844ADEFBF8EB88724F15841AD829A7610C379A545CFA5
                        APIs
                        • PostMessageW.USER32(?,?,?,?), ref: 0820CE8D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391690287.0000000008200000.00000040.00000800.00020000.00000000.sdmp, Offset: 08200000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_8200000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID: MessagePost
                        • String ID:
                        • API String ID: 410705778-0
                        • Opcode ID: 57d4a83a039a234b33236042924ba6960536861c97b7e7b5658e847d269b03a1
                        • Instruction ID: e81a8d84017f617e079bddf316503428fd507851af65aeac04532d1ed608bf77
                        • Opcode Fuzzy Hash: 57d4a83a039a234b33236042924ba6960536861c97b7e7b5658e847d269b03a1
                        • Instruction Fuzzy Hash: 561106B5800349DFCB10DF9AD449BDEBFF8EB49320F108459E519A7651C375A544CFA1
                        APIs
                        • PostMessageW.USER32(?,?,?,?), ref: 0820CE8D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391690287.0000000008200000.00000040.00000800.00020000.00000000.sdmp, Offset: 08200000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_8200000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID: MessagePost
                        • String ID:
                        • API String ID: 410705778-0
                        • Opcode ID: d7212af8a084a9356c91ff26898b7a6946eb5c1cda0c336842618f3eb68a7929
                        • Instruction ID: 350cdd555c380a8200111fef506d3326513210e26cca3b82204455f263e6cc21
                        • Opcode Fuzzy Hash: d7212af8a084a9356c91ff26898b7a6946eb5c1cda0c336842618f3eb68a7929
                        • Instruction Fuzzy Hash: 191112B58003499FCB10DF9AD888BDEFBF8EB48320F10841AE919A3240C375A944CFA1
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391875024.0000000008950000.00000040.00000800.00020000.00000000.sdmp, Offset: 08950000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_8950000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID: LR]q
                        • API String ID: 0-3081347316
                        • Opcode ID: 26258df74be90325e81866708e7a33a2db3671606336828df16898e35bca0a6f
                        • Instruction ID: 43baba21b61de1f9d7cede460ad683ebf61e2c257756da1a9b6af5d38e150fff
                        • Opcode Fuzzy Hash: 26258df74be90325e81866708e7a33a2db3671606336828df16898e35bca0a6f
                        • Instruction Fuzzy Hash: B4710630A0D3958FC706BB74989426D7FB1EF86618F0505EED585E72A3DA384C4AC793
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391875024.0000000008950000.00000040.00000800.00020000.00000000.sdmp, Offset: 08950000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_8950000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID: LR]q
                        • API String ID: 0-3081347316
                        • Opcode ID: cdef38becc2b114eeb71dd47d48e9df43fa4f2e8ddf6622ea6d5a049ce10c1fb
                        • Instruction ID: 8df15532afb8a24d23d24ca5fcc33278077f0caf94e9b883d19a64f97f72e579
                        • Opcode Fuzzy Hash: cdef38becc2b114eeb71dd47d48e9df43fa4f2e8ddf6622ea6d5a049ce10c1fb
                        • Instruction Fuzzy Hash: BF511470B083158FC705BBB9E89526D7FB1EF89608F41096DE085E7292DF38484AC792
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391875024.0000000008950000.00000040.00000800.00020000.00000000.sdmp, Offset: 08950000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_8950000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID: d8bq
                        • API String ID: 0-3484500975
                        • Opcode ID: 9c5d1e1c9db33a2406e2c90364316aa73564f4b090eba61c512297c4d8a38f20
                        • Instruction ID: b44ddc6d184c8b28779a2db6e0396403fc2b5a50d47f348aa5029f6cbae79fcc
                        • Opcode Fuzzy Hash: 9c5d1e1c9db33a2406e2c90364316aa73564f4b090eba61c512297c4d8a38f20
                        • Instruction Fuzzy Hash: F5613235B00119DFCB14EF68D4589AE7BB6AF88726F144469ED02A7391CF71DD42CBA0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391875024.0000000008950000.00000040.00000800.00020000.00000000.sdmp, Offset: 08950000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_8950000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID: LR]q
                        • API String ID: 0-3081347316
                        • Opcode ID: f764050456ac6902304aa98a4ff31c2e4e0b1630d7a4fbad43dcf664a57e0ead
                        • Instruction ID: 3fb8f7eb5311526004618f898c9307b89983b2b6777370e9191542598b3acc9c
                        • Opcode Fuzzy Hash: f764050456ac6902304aa98a4ff31c2e4e0b1630d7a4fbad43dcf664a57e0ead
                        • Instruction Fuzzy Hash: 2751F130B183158FC705BBB9E89562D7FB1EF89608F41486DE089E7291DE385C4AC792
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID: Haq
                        • API String ID: 0-725504367
                        • Opcode ID: b51282ed6d1cbb102b7a6d3f67f115a280ae7d64e5e0e94734f83b6c55ee730e
                        • Instruction ID: 3db0bff9d66d59829756d6f7204a2d5a05da3a27b6a5127f4138df1a18145c21
                        • Opcode Fuzzy Hash: b51282ed6d1cbb102b7a6d3f67f115a280ae7d64e5e0e94734f83b6c55ee730e
                        • Instruction Fuzzy Hash: 524123367006119FD70A6F79985067F7BE7ABC5611B14842AEA06CB3C4DE38CC82C3E2
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID: PH]q
                        • API String ID: 0-3168235125
                        • Opcode ID: 1c4bd6945d000484070ec0d4c8a72cff25a0bcfbf87a99ed786b313550b7f1c3
                        • Instruction ID: 32248c80ed9a449a44ddb6db9437dadc3994c01d3f3ce824759ef04cd33ea1bf
                        • Opcode Fuzzy Hash: 1c4bd6945d000484070ec0d4c8a72cff25a0bcfbf87a99ed786b313550b7f1c3
                        • Instruction Fuzzy Hash: 1E515F31B005058FEB64DF29C994BA9B7B1FF49310F14866DE926DB2A1CB30ED85CB90
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391875024.0000000008950000.00000040.00000800.00020000.00000000.sdmp, Offset: 08950000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_8950000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID: LR]q
                        • API String ID: 0-3081347316
                        • Opcode ID: aa356cd7b461f12fa74786579fa2d61c773c194ed50edf0db549fb697e06230e
                        • Instruction ID: a2a94a134035dc04bd739b07336ae0774968b742c60d71a5efd059d6d7b29bf3
                        • Opcode Fuzzy Hash: aa356cd7b461f12fa74786579fa2d61c773c194ed50edf0db549fb697e06230e
                        • Instruction Fuzzy Hash: D9419170B142158BD708BBB9E88562E7BF6EF88708F41492DE549E3290DF385C45C792
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID: PH]q
                        • API String ID: 0-3168235125
                        • Opcode ID: 660b5091f0cb6f53ef824123076f64b7d96e33f363fc0ef79691b381dbc9421c
                        • Instruction ID: 3cfdb5db982f46c11c7137920275451fe3687ab88d84acfc9657e21aa93b0c72
                        • Opcode Fuzzy Hash: 660b5091f0cb6f53ef824123076f64b7d96e33f363fc0ef79691b381dbc9421c
                        • Instruction Fuzzy Hash: 43510534A00215CFDB54DF68D998AA97BF1BF4C321B214AA8E416EB3A1DB30EC41CF50
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2386460388.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d10000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID: (o]q
                        • API String ID: 0-794736227
                        • Opcode ID: 6cba12612e559654a263aa2b53ff65cd7d1705328e08c4072e57ce52a9ba5e7b
                        • Instruction ID: 8568f4853bd0076c36697763310532668c9381ec30dba1a33098eb78e4a70687
                        • Opcode Fuzzy Hash: 6cba12612e559654a263aa2b53ff65cd7d1705328e08c4072e57ce52a9ba5e7b
                        • Instruction Fuzzy Hash: 29418F35B002049FD7149B69E854AAEBBF6FBCC611F144569E916D7791CF31EC02CBA0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391875024.0000000008950000.00000040.00000800.00020000.00000000.sdmp, Offset: 08950000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_8950000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID: D
                        • API String ID: 0-2746444292
                        • Opcode ID: 8bf1bba46e17eb5e103c998b252d6bd849e2d4c9accc0638a159472ad61356e8
                        • Instruction ID: 9faaac3292804f480abd4091c8c54c00b6fee854788947af74762e405aeec16f
                        • Opcode Fuzzy Hash: 8bf1bba46e17eb5e103c998b252d6bd849e2d4c9accc0638a159472ad61356e8
                        • Instruction Fuzzy Hash: 3931445544E3C25FC70397B49C642857FB0AF03215B1A06EBC8D1CB6E7E668094AC7A7
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID: (aq
                        • API String ID: 0-600464949
                        • Opcode ID: 93bc5ffb2b201ab375f442698d0e45359df995e243c5c84306d792e9561aa9f5
                        • Instruction ID: edbfa112fc58d6863a1aa532bd0fced7b27c95facc3805349f7ce5521ad029f2
                        • Opcode Fuzzy Hash: 93bc5ffb2b201ab375f442698d0e45359df995e243c5c84306d792e9561aa9f5
                        • Instruction Fuzzy Hash: D04175307006018FD7A5DF38D458B5A37A2BF85724F25856DE4AACB2E1DF74D986CB40
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391875024.0000000008950000.00000040.00000800.00020000.00000000.sdmp, Offset: 08950000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_8950000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID: 43^q
                        • API String ID: 0-2065357395
                        • Opcode ID: 61f7afbd2013d55b5cf2a28afc5d80c5fdf0ffce14cb264b4457955787765eb8
                        • Instruction ID: 0dcd084af11bf725ccd3076f7620a34498fab1d669fa4b564207f5e813850766
                        • Opcode Fuzzy Hash: 61f7afbd2013d55b5cf2a28afc5d80c5fdf0ffce14cb264b4457955787765eb8
                        • Instruction Fuzzy Hash: FC21F9717182158FD704BBB9F88462E7BB6EBC9714F91482DE449E3384CE389C16C762
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2386460388.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d10000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID: 4']q
                        • API String ID: 0-1259897404
                        • Opcode ID: 69b491dec955efc36364316eb91cfecaa29349a5e6b2828648bb2ea037c800a9
                        • Instruction ID: 125323686b565c19e0feaf369a22114b3737b8a09e7b43ce7613fad3da335e91
                        • Opcode Fuzzy Hash: 69b491dec955efc36364316eb91cfecaa29349a5e6b2828648bb2ea037c800a9
                        • Instruction Fuzzy Hash: C021E2347A8155ABCB14DE66FC406BB7BEAEBA9210F044827F892C7744DB30DC81C762
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2386460388.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d10000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID: 8aq
                        • API String ID: 0-538729646
                        • Opcode ID: efb1908771c084eb72ff33db66a09325c0dac5a3d7c3accd272061308f9b5f7c
                        • Instruction ID: 482aae5d237a4579000d2835872102320eff19a469efeda2ad493051125089dc
                        • Opcode Fuzzy Hash: efb1908771c084eb72ff33db66a09325c0dac5a3d7c3accd272061308f9b5f7c
                        • Instruction Fuzzy Hash: F431B2B4E012099FDB04DFAAD5406EEBBF2BF88304F248469E515B7350DB349A46CF51
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID: V
                        • API String ID: 0-1342839628
                        • Opcode ID: cf3a1129c6fd8c0ff218a9d0b02a7370585b41da0022916eb05fe4671e550d16
                        • Instruction ID: a05575e98c9f4164c4d78269c85acdb0b4ada5bd1539b504973ac333e80a1387
                        • Opcode Fuzzy Hash: cf3a1129c6fd8c0ff218a9d0b02a7370585b41da0022916eb05fe4671e550d16
                        • Instruction Fuzzy Hash: 68310131D14B499ECB01EFB8C854499F771FF95300B118B9AE9596B122EB30E6D5CB80
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2386460388.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d10000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID: 8aq
                        • API String ID: 0-538729646
                        • Opcode ID: 3ff80e4c92db09e7f4eab1f0206211040d5fb160edb1e0eba5145fde3a3bc804
                        • Instruction ID: c7ad38b1ab29a3ed769446885b13d39c89333f0453e0612287a3c4483ead2263
                        • Opcode Fuzzy Hash: 3ff80e4c92db09e7f4eab1f0206211040d5fb160edb1e0eba5145fde3a3bc804
                        • Instruction Fuzzy Hash: 5111C1B5D0525BEFCB00CFA8E4445ADFBB1EF05210F60419AE154AB392D334DA46DB42
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391875024.0000000008950000.00000040.00000800.00020000.00000000.sdmp, Offset: 08950000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_8950000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID: 43^q
                        • API String ID: 0-2065357395
                        • Opcode ID: 65f183eb21958a482fbef03c177626a14a5ae0c6679d0de238ba0067ffd9ad0b
                        • Instruction ID: 39e1310e8946c286566dc75fdc649a3785b9a08fd977b09d03c22b278362405e
                        • Opcode Fuzzy Hash: 65f183eb21958a482fbef03c177626a14a5ae0c6679d0de238ba0067ffd9ad0b
                        • Instruction Fuzzy Hash: 0B016D74A112059FCB08EFA9F4556AD7BB2EB85215F2089AAEC06CB340DE745D069B90
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b62eb72b50c0b4ab95a888694171c9bb7e3a6a22d75c40fd15990c659f6af6db
                        • Instruction ID: dbfe61632a00a144fca6a8ddfc2cb2932f157c08fbb87acf351471e03aaa5ee9
                        • Opcode Fuzzy Hash: b62eb72b50c0b4ab95a888694171c9bb7e3a6a22d75c40fd15990c659f6af6db
                        • Instruction Fuzzy Hash: 3D62E3B0E10B954BEFF49F78C48C3AEB691AB56350F50491EC2BACA6C0DF389641DB45
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391875024.0000000008950000.00000040.00000800.00020000.00000000.sdmp, Offset: 08950000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_8950000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c492eec4d1dc35a686e95f22d7cd92f8d17b7b88d96da3bdce2e775804918738
                        • Instruction ID: 8e99d0e291c20ae2859e9b43f72f809f4f9fca559f7208dad9c691b337771432
                        • Opcode Fuzzy Hash: c492eec4d1dc35a686e95f22d7cd92f8d17b7b88d96da3bdce2e775804918738
                        • Instruction Fuzzy Hash: 3F12F170A183548FC705FBB8E99426D7FF1EF89604F4509AAE489E7392DB385C06CB52
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391875024.0000000008950000.00000040.00000800.00020000.00000000.sdmp, Offset: 08950000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_8950000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e9c66ae9973e8496a2c1ccc74f3f59f1e04cec49a92831eecddf619845543ed7
                        • Instruction ID: 3f6ce4744a9f29342912a808372d2de00bc74e8d59c6a405cce622947b0702e0
                        • Opcode Fuzzy Hash: e9c66ae9973e8496a2c1ccc74f3f59f1e04cec49a92831eecddf619845543ed7
                        • Instruction Fuzzy Hash: 64F1D570A1C3518FD305BB78D9546197FF2EF8A604F4649AEE489E7292DA3C8C4AC353
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 01f2b9913bdc0c9125593502a62a0d73d53999a3bc68145f5d92dad818579437
                        • Instruction ID: 85773a530bf636c1e436e571587fff174b4044839ee26ee9a53e595cba1b57f9
                        • Opcode Fuzzy Hash: 01f2b9913bdc0c9125593502a62a0d73d53999a3bc68145f5d92dad818579437
                        • Instruction Fuzzy Hash: 27124EF0D15BD24AEFF89F68848C39FB690AB15340F20491FC1FAC9695DB389286DB45
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391875024.0000000008950000.00000040.00000800.00020000.00000000.sdmp, Offset: 08950000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_8950000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 0d94faf084bf9e1b4931fb9efe38032858d76fc41eb5a1a301b6fb53e606491d
                        • Instruction ID: 62574ed9f3f6773b83c57a43e63a203b1bb165055df7030400dbd793102e25eb
                        • Opcode Fuzzy Hash: 0d94faf084bf9e1b4931fb9efe38032858d76fc41eb5a1a301b6fb53e606491d
                        • Instruction Fuzzy Hash: 8FF1B170A142198FC744FFB9E98466D7BF2FF88614F414928E449E3394EB38AC46CB52
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391875024.0000000008950000.00000040.00000800.00020000.00000000.sdmp, Offset: 08950000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_8950000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f2be1e0caad2851493879d235de05d482eabf9915544187664f88e20c873255a
                        • Instruction ID: 7516beaf82d3b6359c9d0912c6b740e31b021e4057751df13bc26042430145b9
                        • Opcode Fuzzy Hash: f2be1e0caad2851493879d235de05d482eabf9915544187664f88e20c873255a
                        • Instruction Fuzzy Hash: CDE17E71A142158BC704FBB9E98426DBBB2EB8C614F854938E449F3354DF3C9C86C766
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d5d93b855cb6db3f3e5b8ef099fda3317bcc985e06cfdf735b650968f79176f0
                        • Instruction ID: 2f6eadfc2f3f8ef04684ed42ad1d9489952e9b803af08109b342d3b45f240b47
                        • Opcode Fuzzy Hash: d5d93b855cb6db3f3e5b8ef099fda3317bcc985e06cfdf735b650968f79176f0
                        • Instruction Fuzzy Hash: 67021974A00205DFDB44DFA8D498AAD7BF2BF89314F1585A8E409DB3A2DB34ED85CB50
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391875024.0000000008950000.00000040.00000800.00020000.00000000.sdmp, Offset: 08950000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_8950000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 69e9408831e77a8118ae227876209ee7bc14d2a28419d0a62eaae97d2e13e706
                        • Instruction ID: fa7a286126ff009c4fec6416c6e9f1f646633ada3c2a051152b555053cfc8b01
                        • Opcode Fuzzy Hash: 69e9408831e77a8118ae227876209ee7bc14d2a28419d0a62eaae97d2e13e706
                        • Instruction Fuzzy Hash: 46C1A13470021A9FCB05EF68D854AAE7BA7BF88715F148469ED069B3A1DF30DC52CB91
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391875024.0000000008950000.00000040.00000800.00020000.00000000.sdmp, Offset: 08950000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_8950000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: df5b339ad81180e393a9de3371b36f73f4bd6e293b6234a51ad88c99c4b95b32
                        • Instruction ID: 51edf0a1050426e2ef03839a96ba149d85c7cbdad076322f842d28a7b594efac
                        • Opcode Fuzzy Hash: df5b339ad81180e393a9de3371b36f73f4bd6e293b6234a51ad88c99c4b95b32
                        • Instruction Fuzzy Hash: 89B1AF70A14224CFCB04FBB9E95816D7BB2EF89608F414969E449F7390DF389C06C7A6
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391875024.0000000008950000.00000040.00000800.00020000.00000000.sdmp, Offset: 08950000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_8950000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 0f04dd2aa6217961ea977ff059d2774e7b35bc30f6ddb0bdb28c7451725c1349
                        • Instruction ID: d58904b29d6fcacc0d57b34e42e72d54250ddadd6c0e8d529d4f510ae75ba0f5
                        • Opcode Fuzzy Hash: 0f04dd2aa6217961ea977ff059d2774e7b35bc30f6ddb0bdb28c7451725c1349
                        • Instruction Fuzzy Hash: 7C91AE35A14725CBCB44BBB9E48912D7FF2EF88610F454978E845E3354DF389846CB91
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391875024.0000000008950000.00000040.00000800.00020000.00000000.sdmp, Offset: 08950000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_8950000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c0f7883a0872abb7f04983b6e8dc6a994318cf334fc9cf498376704fed91d3df
                        • Instruction ID: 2343a2dc0f2ad50aaba976e00d98e28bf1edc864aefc0e33ea1e481e068ddd74
                        • Opcode Fuzzy Hash: c0f7883a0872abb7f04983b6e8dc6a994318cf334fc9cf498376704fed91d3df
                        • Instruction Fuzzy Hash: CB91BE35A24725CBCB44BBB9E48912D7FF2EF88610F450978E845E3354DF389846CB91
                        Memory Dump Source
                        • Source File: 00000000.00000002.2386460388.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d10000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: da0072bf403bb3c983860362e18a236d3766d3e8903486d56ad323a16295f03d
                        • Instruction ID: 6dc1958dec251a136d6988dec7b13387dacd334fec581de71709b0db54fc8fd6
                        • Opcode Fuzzy Hash: da0072bf403bb3c983860362e18a236d3766d3e8903486d56ad323a16295f03d
                        • Instruction Fuzzy Hash: AB61CF743002129FCB149F78E498B3A7BE2ABC8254F544569E846CB791DF38DC42CB91
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ed9e65275eca1a50014855217872101ca95ae09f5a1bd85346e5a66e3c05e618
                        • Instruction ID: c449a1f6493cb38fccba2de3b08e10a997f5fe87e46b07d9badfc0e74918e028
                        • Opcode Fuzzy Hash: ed9e65275eca1a50014855217872101ca95ae09f5a1bd85346e5a66e3c05e618
                        • Instruction Fuzzy Hash: 45711774640605CFDB54DB28C898E697BF1BF89314F2589A9E54ACB3B2DB30EC45CB60
                        Memory Dump Source
                        • Source File: 00000000.00000002.2386460388.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d10000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f89e92af9efeb8195d00098b540f121a6b0b854dfe98925ab9a7c3f3bbf83119
                        • Instruction ID: 3aaf15211136d1675e1dd0c3d12d7d91e666b6cfa2fde17cb4ac154180d3f413
                        • Opcode Fuzzy Hash: f89e92af9efeb8195d00098b540f121a6b0b854dfe98925ab9a7c3f3bbf83119
                        • Instruction Fuzzy Hash: BD51CE317A4111AFC714DF3DE888A2A7BE5BF4821471944BBE44ACB7A1EB31DC41CB52
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c84da2b0a69c5d39792d2ca3f00076832ed8bffabecc88870b7bcf0d26b39f2b
                        • Instruction ID: c137dace86a646e401d1d23b1e8fe5df92d4c879418603ef6bdb9d15da6a596f
                        • Opcode Fuzzy Hash: c84da2b0a69c5d39792d2ca3f00076832ed8bffabecc88870b7bcf0d26b39f2b
                        • Instruction Fuzzy Hash: DC410570A093408FDBA5EB78C41422E7BB7AF8A614F1485ADD06ECB7D1CB35D942CB41
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 3b75c181648f1c6798117645e6b96db33d2986e7e210128984b1c31d1bce331f
                        • Instruction ID: 87d2e1649bf35d7100df83f082ffc421eead5bb0f202ad4bb0f20e2b2308e990
                        • Opcode Fuzzy Hash: 3b75c181648f1c6798117645e6b96db33d2986e7e210128984b1c31d1bce331f
                        • Instruction Fuzzy Hash: E241B2707006019FE7A8EB64C894B6EB3A6FF85704F1045ADE1168B3E1CB75AD06CB90
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 62443914f84d1dd9a64c1fa58cd2e2cfb0c2607e1459459dd6263f4905bbe385
                        • Instruction ID: 1d88b9f76e911069ff32fd43a317c2f9a80f6ffb9cc7b7a29de43d0bb98a81b1
                        • Opcode Fuzzy Hash: 62443914f84d1dd9a64c1fa58cd2e2cfb0c2607e1459459dd6263f4905bbe385
                        • Instruction Fuzzy Hash: 3A41A0B490031ACFDB54DFA9D8806AFBBF5FF49310F14852AD915E7281D7349904CBA1
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 9fc51b05d820cf411344d5ae6af048c9725386a5c4cfa16cc8c13d57bf92cdba
                        • Instruction ID: f38ca82d87b10aef3027e1559dcc148c058338874b2045e739f11fcc79bf119a
                        • Opcode Fuzzy Hash: 9fc51b05d820cf411344d5ae6af048c9725386a5c4cfa16cc8c13d57bf92cdba
                        • Instruction Fuzzy Hash: 9D4183707006019FEBA4EB65C884B6AB3A6FF85714F10856DE1168B3E1CB76ED46CB50
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 632303855eb9a062efad3022544c527c94f01f549076e393c880c3cc9c054e8d
                        • Instruction ID: 49016ab102ce075758b0f730fa83c2f75ef74f987a34d62e5a64c16056cef502
                        • Opcode Fuzzy Hash: 632303855eb9a062efad3022544c527c94f01f549076e393c880c3cc9c054e8d
                        • Instruction Fuzzy Hash: 2741BF707007158FD7A8EF38C85052E77F2AF89214B20466DD45A8B3E2DE35ED06CBA1
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391875024.0000000008950000.00000040.00000800.00020000.00000000.sdmp, Offset: 08950000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_8950000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: eb9cbfa089038d30732398b76600947d2b82b4fd5a38e29621aff036fde09d2e
                        • Instruction ID: 1eba210af71d45fc427ee726bc49da1c697138da945ac8089000874f23ebaa9a
                        • Opcode Fuzzy Hash: eb9cbfa089038d30732398b76600947d2b82b4fd5a38e29621aff036fde09d2e
                        • Instruction Fuzzy Hash: FD413574D003099FDB14EF99D884BAEBBF5BF48319F14802DE81AAB250C774A945CB95
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 1e923df0027421fb5b5f20e36e0fec912f9905bf1e13656146cb4d8918e4e14f
                        • Instruction ID: 0be3b4865cfe6399aca25d9eaacd4113266b5bd7b89edaeb6336ef9d8bb4b33c
                        • Opcode Fuzzy Hash: 1e923df0027421fb5b5f20e36e0fec912f9905bf1e13656146cb4d8918e4e14f
                        • Instruction Fuzzy Hash: CB4191707006019FEBA4DB64C884B7EB3B6BF85714F14466DE1168B3E1CB75AD46CB60
                        Memory Dump Source
                        • Source File: 00000000.00000002.2386460388.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d10000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 9b065324870689d25d83af14130b8cd29c467743451853127a8f23fa95613fc8
                        • Instruction ID: fd98d7eb9dac1b03c4d9fc447dc22803e7ca1170e2176c360239b364c7ef1640
                        • Opcode Fuzzy Hash: 9b065324870689d25d83af14130b8cd29c467743451853127a8f23fa95613fc8
                        • Instruction Fuzzy Hash: EA51E174D04219DFDB14DFA9E4483EDBBF1AF88305F14842AD119A6394EB789A86CF50
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391875024.0000000008950000.00000040.00000800.00020000.00000000.sdmp, Offset: 08950000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_8950000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: afeb970c680d241800abb0fbbd8199ece8e8b20f877917e02a46aaf1de2a616c
                        • Instruction ID: 04b04fc5d247a4da6699b895facd4411dc8ccb788ff1a57affd4a0c4f0621dff
                        • Opcode Fuzzy Hash: afeb970c680d241800abb0fbbd8199ece8e8b20f877917e02a46aaf1de2a616c
                        • Instruction Fuzzy Hash: 22416031900B099FCB14EFA9C84469EF7B5FF88314F15C66DE8097B264EB70A985CB90
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391875024.0000000008950000.00000040.00000800.00020000.00000000.sdmp, Offset: 08950000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_8950000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c164dcbcc94ef7dd8ea6df542e6b75a0f85228e3727e9739af0f3262d4c134a1
                        • Instruction ID: 2fe3766e09329a6a41f53f24076d2739adea2e0700186b6e14a74ba229b61692
                        • Opcode Fuzzy Hash: c164dcbcc94ef7dd8ea6df542e6b75a0f85228e3727e9739af0f3262d4c134a1
                        • Instruction Fuzzy Hash: 49414474D003099FDB14EF99C884BAEBBF5BF48319F14802DE81AAB290C774A841CF95
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4f86782fc4d51275ece2849dde24708da9c08f58cd3914da3c4432395dc38f55
                        • Instruction ID: b5c562191816c5769e28a2111fd2f187b2d03ae0264071a304a2c4966964906f
                        • Opcode Fuzzy Hash: 4f86782fc4d51275ece2849dde24708da9c08f58cd3914da3c4432395dc38f55
                        • Instruction Fuzzy Hash: A431F631B052928FEB94DB29C8447BE37BAAF84614F18407AE509DB2D1DB38C941C7A1
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ecc6bb13159a83de0b7c6f41c2d43ea901bd81510616f050bb26152057a03c1d
                        • Instruction ID: 1edb4381f39e7d80cf09eb8bfc3e4d9158564d56c6ec15cf0f88b56c7d7380e5
                        • Opcode Fuzzy Hash: ecc6bb13159a83de0b7c6f41c2d43ea901bd81510616f050bb26152057a03c1d
                        • Instruction Fuzzy Hash: 4D319C70700A118FDB98AB38D85863E7BE2AF89214B14866DE05AC73E1DF74E942CB45
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 7c6272152f138c09ce89f347154954d049bc6d90be8acce61645b2ee2b864001
                        • Instruction ID: 64e54b5035c3f7f0a749348c1fbaa50c93a83c9fce218f8e9cde43073cefe7f3
                        • Opcode Fuzzy Hash: 7c6272152f138c09ce89f347154954d049bc6d90be8acce61645b2ee2b864001
                        • Instruction Fuzzy Hash: 20319C70700A118FDB98AB38D85863E7BE6AF89614B14866DE05AC73D1DF74ED02CB85
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 8929ec7f40e1939599610d84c859cdd361a6eb6c6ba58e27a4d0853adb86567c
                        • Instruction ID: 59884e2f490451342177c4e8b3b224943cdb3b16496a7fb295297c719830e86d
                        • Opcode Fuzzy Hash: 8929ec7f40e1939599610d84c859cdd361a6eb6c6ba58e27a4d0853adb86567c
                        • Instruction Fuzzy Hash: FA310A347106118FEB94DB29C884B6A73E6FF89714F1586A9E45ACB3A1DF30ED41CB90
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391875024.0000000008950000.00000040.00000800.00020000.00000000.sdmp, Offset: 08950000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_8950000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 387fa0ba66917f77f6006fc350f7d5f5b9a9a7dddd1f4b2d1f9f884ce96d6ae7
                        • Instruction ID: ce7545f446dcc81d2dc8076190350d3b7b87b1c6d20fa77c80b82e81edc60bf3
                        • Opcode Fuzzy Hash: 387fa0ba66917f77f6006fc350f7d5f5b9a9a7dddd1f4b2d1f9f884ce96d6ae7
                        • Instruction Fuzzy Hash: 9D310930A0D3954FD301BBB99C5819DBFB1EF86618F0546AED4D5E72A2D6384C06C763
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f7afbde2d4ae6889302e69758aa3e934e62316bee439fd56d953d9426f746285
                        • Instruction ID: afa9c6fc9619c144e2937ad53314ba8cbf87bba1a77dd3241231b3b3a8bd1ca9
                        • Opcode Fuzzy Hash: f7afbde2d4ae6889302e69758aa3e934e62316bee439fd56d953d9426f746285
                        • Instruction Fuzzy Hash: DD314A34B046008FEB95DB28C844B6977F6AF89704F1686AEE456CB3B2DB30ED41CB50
                        Memory Dump Source
                        • Source File: 00000000.00000002.2386460388.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d10000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b2749ba22c48a55e4ea2853064526793a328328bb172d14ad9d4f11a40978212
                        • Instruction ID: 804f807fad93a108d1872c226398d4cd8b1c636aafa7f44afb424cc7d8cac826
                        • Opcode Fuzzy Hash: b2749ba22c48a55e4ea2853064526793a328328bb172d14ad9d4f11a40978212
                        • Instruction Fuzzy Hash: 2D318435744209AFDB05AF99E594A6F3FA2FB88314F048018F90687755CF35DC61DB90
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 14a1460b993d2f5c5b9869dec92cb05033c1940eba2cfa564416c6736c638daf
                        • Instruction ID: d25f9ee6feabd10e1c3abedcc29b8ce61d4889656abe1c6ca01f534330342e33
                        • Opcode Fuzzy Hash: 14a1460b993d2f5c5b9869dec92cb05033c1940eba2cfa564416c6736c638daf
                        • Instruction Fuzzy Hash: 7F411474640605CFDB44DF28C988E997BB1BF89314F2589A9E54ACB372DB30EC45CB60
                        Memory Dump Source
                        • Source File: 00000000.00000002.2386460388.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d10000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 62764579cb4c4855a5f9b1847d11bd9567ed88cd59f279a28c94850edc99b066
                        • Instruction ID: ea877106ebad151760a505a868fe802eb81797c413de0618d2c3f428c68bd851
                        • Opcode Fuzzy Hash: 62764579cb4c4855a5f9b1847d11bd9567ed88cd59f279a28c94850edc99b066
                        • Instruction Fuzzy Hash: BF21D1303642026BEB2967B9A49477E3A979FD5A04F14C03BD402CBB95EF68CC42D383
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 3796202ec60f9b6dfd623a4f645cb9dc3b63d5ee59b12e009883e876dcad2854
                        • Instruction ID: f69e4835293297384b12c2764fd925ade51a8667a37da6827263878e30468ce9
                        • Opcode Fuzzy Hash: 3796202ec60f9b6dfd623a4f645cb9dc3b63d5ee59b12e009883e876dcad2854
                        • Instruction Fuzzy Hash: 8F3160306106008FD7A4DF28C448B6637A6FF84725F65C56DE86A8B2E1DF74E9C6CB40
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: dc83d866e9beec05f3a4eb86616cb6835d3b8fc18b4f525b366fa5a19488cd25
                        • Instruction ID: 7933a28a215abe0a307e470101df42a5644a1b92ab274857a9e542edc757b6df
                        • Opcode Fuzzy Hash: dc83d866e9beec05f3a4eb86616cb6835d3b8fc18b4f525b366fa5a19488cd25
                        • Instruction Fuzzy Hash: 0521BE34B081458FABD667BA982463E26D79FC46A9718402DD90BCB3D0EF25DE03C392
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 147b8a09c60bd5609720880063d5099783072544922e25478c9d5b89c908b421
                        • Instruction ID: 35b6fd785750f8879d6e795b691906db9f05958a494dc16be5f71a4148c92f20
                        • Opcode Fuzzy Hash: 147b8a09c60bd5609720880063d5099783072544922e25478c9d5b89c908b421
                        • Instruction Fuzzy Hash: 862191707007008FD764EF39D890A5AB7F2AF89614B20567DD46A9B3E2DB31EC06CB61
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 3ae9de5cbac76667a8624442023245b0bc18583ca698002f44052bac8153e9ea
                        • Instruction ID: a11a0f2eca03ac3d207ced92cbb4f4744ede167710707bd03b3133d2f8c185ac
                        • Opcode Fuzzy Hash: 3ae9de5cbac76667a8624442023245b0bc18583ca698002f44052bac8153e9ea
                        • Instruction Fuzzy Hash: A1310D74A002058FDB94EF69C454A9D7BF2EF88325F244169E806AB3A1CB35ED81CF50
                        Memory Dump Source
                        • Source File: 00000000.00000002.2386460388.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d10000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: cd124c6ef404041bf31a94952720e383e2b7a2e662e70e37128bc5508546aaae
                        • Instruction ID: a606f3bba689d2b7c89abb44aaa5ddb2a08e34a14b96aedb9655c20513bcb9d7
                        • Opcode Fuzzy Hash: cd124c6ef404041bf31a94952720e383e2b7a2e662e70e37128bc5508546aaae
                        • Instruction Fuzzy Hash: DE21F639740611DBCB259B69F498A2A77A2FFC87557184279E906CB794CF34DC02CBC0
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 387d29ece398e5b4e283e3182afd1bba2397f0fe1bb042d62c43039287271591
                        • Instruction ID: 12b6f27afdd86919eb728540e7bfa99f354d3ef20709423a0d08351a9915a3b0
                        • Opcode Fuzzy Hash: 387d29ece398e5b4e283e3182afd1bba2397f0fe1bb042d62c43039287271591
                        • Instruction Fuzzy Hash: 8C010470E102198FDF54EBB4C9646AEBBF6AF8D214F104828D912B7390EF385D45CBA0
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 0fb2b80ef6871c6f2e400122573b46e4567668077af2408d65c54accafc4ae0f
                        • Instruction ID: 35b544d68be8a2360007dfb9eedcc8f5b2b320871680ad826f4870a0227f22dd
                        • Opcode Fuzzy Hash: 0fb2b80ef6871c6f2e400122573b46e4567668077af2408d65c54accafc4ae0f
                        • Instruction Fuzzy Hash: AB110634B081418FBB86677A982463E7A979FC5655718006DD90BCB3D1DF25DD03C392
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: da8c170e194c8d185f365a6d4155f93af69bdcb159e293f00279379c0580bbd9
                        • Instruction ID: 408ce88bd69e954468c720d0e6907fe7eb7b58162427e99841dc139ab06ae9b6
                        • Opcode Fuzzy Hash: da8c170e194c8d185f365a6d4155f93af69bdcb159e293f00279379c0580bbd9
                        • Instruction Fuzzy Hash: 8221323AA00911DBE7466F98D88077FB7E6EB84301F50851AEA06C72D0DF38CC92C3A1
                        Memory Dump Source
                        • Source File: 00000000.00000002.2386227971.000000000138D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0138D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_138d000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f849ecfd147d3aaa69d386ded5c679a95dcdb7b8c1dc45af2e4574b61c5dee7c
                        • Instruction ID: 4df13d0a812b51d47dcc9061ac2452dc1a194e467e81b8f9869fa446cd253f75
                        • Opcode Fuzzy Hash: f849ecfd147d3aaa69d386ded5c679a95dcdb7b8c1dc45af2e4574b61c5dee7c
                        • Instruction Fuzzy Hash: AC2128B1504308DFDF05EF98D9C0B16BF65FB8432CF24856DD9090B286C336D456C6A1
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: a6c566f2a599139724095c57621efae966e674a4f66a4deeb1c2f8a6db7cbf36
                        • Instruction ID: 5f67bbe69264fe8a8187197d00e54eabe392fdc2e208d286a1651f1992e8cc7c
                        • Opcode Fuzzy Hash: a6c566f2a599139724095c57621efae966e674a4f66a4deeb1c2f8a6db7cbf36
                        • Instruction Fuzzy Hash: 85314F306106018FD754DB28C488BA677E2FF85715F15857AE59ECB3A1CF74AC86CB40
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 96b4ec727330d7c6c96783dc009849c01b2093952c39fec4fd77b7046572483f
                        • Instruction ID: 996422bdc5349f9aa28ccdfd5a6de5aa1f3cbd47f06c48cf1149bbfc6504be25
                        • Opcode Fuzzy Hash: 96b4ec727330d7c6c96783dc009849c01b2093952c39fec4fd77b7046572483f
                        • Instruction Fuzzy Hash: E031FE32D10B099ECB01AFA8C854899F771FF95340B118B5AE9596B221FB30E695CB80
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: a78f8a0da787e7c2ee2ba9bc183b29e9f71559367d14ee62b4caa6ed2ff7530c
                        • Instruction ID: 9d51a84a6e9d074f895989f9e3cea02653ebb535e10bbed4dae6fbd347fe3b0a
                        • Opcode Fuzzy Hash: a78f8a0da787e7c2ee2ba9bc183b29e9f71559367d14ee62b4caa6ed2ff7530c
                        • Instruction Fuzzy Hash: B121D471A00254AFEB41CFA8C880AEEBBF5FF49310B18406AF918C7651C731DA11CBA0
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391875024.0000000008950000.00000040.00000800.00020000.00000000.sdmp, Offset: 08950000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_8950000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 308c2e66bc92e0235219c54b6fce21d2ebb71ded6fb813298807e8a03fbfab0b
                        • Instruction ID: d6d9dee64ab88537aa1d8962034962904447c1aeab85a9f62781df8da6872bcb
                        • Opcode Fuzzy Hash: 308c2e66bc92e0235219c54b6fce21d2ebb71ded6fb813298807e8a03fbfab0b
                        • Instruction Fuzzy Hash: 0C21157441E3C19FE7136B3498282943F70AF43215B1A05EBE4D1CB0E3EB39994AC72A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: aaec4d4a1ca50e785135c7ca1190a881f6caeef8ed4e9f422413e173acd53e62
                        • Instruction ID: f21098aa3553c707e24fa8d1455a1a9b1556e7b765efd707799ae57c762849b7
                        • Opcode Fuzzy Hash: aaec4d4a1ca50e785135c7ca1190a881f6caeef8ed4e9f422413e173acd53e62
                        • Instruction Fuzzy Hash: 9821BE74A0021A8BDF51DF69DC805BFBBF5EF45300B04852AE818EB285E734DA11C7A2
                        Memory Dump Source
                        • Source File: 00000000.00000002.2386285334.0000000002C4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C4D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2c4d000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 1d6255609bf2947252cda67451e2110b71a277e7aaaa86af11aebec0e742ccd2
                        • Instruction ID: a0274dfc729b26210226fe1a052a5f56f3e7a0b46ccb218b752649367e7d8cb4
                        • Opcode Fuzzy Hash: 1d6255609bf2947252cda67451e2110b71a277e7aaaa86af11aebec0e742ccd2
                        • Instruction Fuzzy Hash: D82107B1604200EFDB15EF14D9C0B26BBA5FB84314F24C6ADED0B4B352CB36D846CA61
                        Memory Dump Source
                        • Source File: 00000000.00000002.2386285334.0000000002C4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C4D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2c4d000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 3e3034f0e736a65a63ea200afedf00fc6d4c11e4cbc117ebb16e5b1c5c506167
                        • Instruction ID: 82e7178bf247c82d7b920d1318349448b00f3988bffd22f23957ee3d8cca6b9b
                        • Opcode Fuzzy Hash: 3e3034f0e736a65a63ea200afedf00fc6d4c11e4cbc117ebb16e5b1c5c506167
                        • Instruction Fuzzy Hash: 3521F2B1604240DFDB14EF14D9C4B27BBA5EB84314F24C5ADE80B4B246CB3AE407CAA1
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 20a7ed131ac9cfaef40f30332f2d20bffcb3c3d96aed0f3b4f7d59266efa2b70
                        • Instruction ID: 220e4fc0147c2b86024dd1a89a9993bbc38dd801c1148a7ab8dcd280dcdca68c
                        • Opcode Fuzzy Hash: 20a7ed131ac9cfaef40f30332f2d20bffcb3c3d96aed0f3b4f7d59266efa2b70
                        • Instruction Fuzzy Hash: 343139346106018FD754DB28C858BA577E2FF85315F1585AAE58ECB3A1CF74AC86CB40
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 42dde2f849d515e97bdf4b00f705c7ce04936e62d60018e9a652e8a51a21f95d
                        • Instruction ID: 648ae68938e23d8a90bd7616e86e1976e2fc9e830364aed4226bee9509df42be
                        • Opcode Fuzzy Hash: 42dde2f849d515e97bdf4b00f705c7ce04936e62d60018e9a652e8a51a21f95d
                        • Instruction Fuzzy Hash: 0A11D6383046214FEB45BB68C81176F7697EBC9704F04442AE152D7BDACE759C0287A1
                        Memory Dump Source
                        • Source File: 00000000.00000002.2386460388.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d10000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c6bd135c876b7ff2deb322dd5741af0baeb7dfdcd44af20ac1c2b1773d5907cc
                        • Instruction ID: eb909f8c0c80e20e507501d8aabf24d52b55c6c1322aea003438eabb20cc99bf
                        • Opcode Fuzzy Hash: c6bd135c876b7ff2deb322dd5741af0baeb7dfdcd44af20ac1c2b1773d5907cc
                        • Instruction Fuzzy Hash: 94213874E012199BDB08DFAAD4083EEBBF2AB89304F04942AD515B3390DB388A45CF64
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391875024.0000000008950000.00000040.00000800.00020000.00000000.sdmp, Offset: 08950000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_8950000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 1e61f907db4a06b39e70cc06cf1c2dd9b36815e45ec639aba21fde05f8535ec4
                        • Instruction ID: 4b773e0ce29e161d17726b8492c35c8f07a1ae24b77cc21daad18be9bdfb0da7
                        • Opcode Fuzzy Hash: 1e61f907db4a06b39e70cc06cf1c2dd9b36815e45ec639aba21fde05f8535ec4
                        • Instruction Fuzzy Hash: 2D31E0B0D002189FDB20DF9AC588BCEBBF5BB48314F24841AE905BB240C3B66845CFA5
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391875024.0000000008950000.00000040.00000800.00020000.00000000.sdmp, Offset: 08950000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_8950000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2fefcf3c1c2a97501207c172b721d1626c70cb8ede59126aa5f7a7d5bf42eb1d
                        • Instruction ID: 554c76b9b8e2ecf4b29ef5bbcd340bacd2bbdc0e2104c22ad6b57085b41b0723
                        • Opcode Fuzzy Hash: 2fefcf3c1c2a97501207c172b721d1626c70cb8ede59126aa5f7a7d5bf42eb1d
                        • Instruction Fuzzy Hash: 7E219D717000098FCB44EF79C864ABE7BFABBC8611B248468E906E7391DE34DD01CB60
                        Memory Dump Source
                        • Source File: 00000000.00000002.2386460388.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d10000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 943336373c762a2f4dde81a98543988a74b49269a5b47b6907a16ea06e4557eb
                        • Instruction ID: 3134a2c3dc25d9ebe6458fc81ec910c1c4b40b46435ebd65aac6ba8f22f7fae9
                        • Opcode Fuzzy Hash: 943336373c762a2f4dde81a98543988a74b49269a5b47b6907a16ea06e4557eb
                        • Instruction Fuzzy Hash: 3521D575348209AFD705AF69F468B6B3BA1FB84718F048029F9068B791CB34DC61DB90
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 6c746c783c69bfa13e34e83dfd8bbfc3855c86e67e97683a5422bf635ef22804
                        • Instruction ID: 74d5c2be4a757fc137340ab840b66442016cdd00b6c7b124c55388158c588c7a
                        • Opcode Fuzzy Hash: 6c746c783c69bfa13e34e83dfd8bbfc3855c86e67e97683a5422bf635ef22804
                        • Instruction Fuzzy Hash: 5811D031704604CFD764EF79C88882AB7B5EF8631171056AEE00ACB3B0DA31EE85CB61
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4e55a7a3f858f0382621ecf872a16218f21abe521ccf9aa070a48f0353aa210b
                        • Instruction ID: ed6b8c4b159b39b5e9196bef763e5da714a74d636049f42c62767f9a0a0321b1
                        • Opcode Fuzzy Hash: 4e55a7a3f858f0382621ecf872a16218f21abe521ccf9aa070a48f0353aa210b
                        • Instruction Fuzzy Hash: 9F11B2383002214FEB44BB69D81176F76DBEBC8B04F04442AE112D7BDACEB5AC4253A1
                        Memory Dump Source
                        • Source File: 00000000.00000002.2386460388.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d10000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 6f3defaf9e5b11e56bccc222b944d6f20a6d38f57b332657ce14b9cc228a0aca
                        • Instruction ID: a04c6dd6d91eee007a12d956578b32c02b1262b2d1d0589b63128716e6f45397
                        • Opcode Fuzzy Hash: 6f3defaf9e5b11e56bccc222b944d6f20a6d38f57b332657ce14b9cc228a0aca
                        • Instruction Fuzzy Hash: E5211874E002099FDB14CFAAD848BADBBF2EF8A314F149029E505B73A0DB749945CF64
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391875024.0000000008950000.00000040.00000800.00020000.00000000.sdmp, Offset: 08950000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_8950000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 551f5ace488c94f2ec2a6c2a0f9eb3d669ac2a71664e15e58a4064cb91016f09
                        • Instruction ID: a0d8d2be3ca4d48fe662d4cc9661fef809c135be149241ef3e668e87bc77a00d
                        • Opcode Fuzzy Hash: 551f5ace488c94f2ec2a6c2a0f9eb3d669ac2a71664e15e58a4064cb91016f09
                        • Instruction Fuzzy Hash: EB213A75A00208EFCF05EFA4E944ADD7BB2EF48321F144429ED02B7260DB319D55CB60
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 31f0cb2146a3601343a2d34a801885b4bbd3b45e85968e39071cc2ddf10b7a4a
                        • Instruction ID: e71544e7cb01ce73b6128bdeb44b477bbe8d1f046c245d75f5724be3cef1f681
                        • Opcode Fuzzy Hash: 31f0cb2146a3601343a2d34a801885b4bbd3b45e85968e39071cc2ddf10b7a4a
                        • Instruction Fuzzy Hash: F0112B347103009FEB659729C990B6B73A2EBC5320F64CA6EE4459B2D0CB74D942CB90
                        Memory Dump Source
                        • Source File: 00000000.00000002.2386285334.0000000002C4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C4D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2c4d000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d47eb463cc27b28bc833d62d70b58659eccbe9c2a5834f0a73dd5521d4e7212e
                        • Instruction ID: 80b4a266498a24e999797d875013094b1160d3f51d361d89605587dcec35f723
                        • Opcode Fuzzy Hash: d47eb463cc27b28bc833d62d70b58659eccbe9c2a5834f0a73dd5521d4e7212e
                        • Instruction Fuzzy Hash: F42195755093C08FCB02DF24D594715BF71EB46214F28C5DAD8498F6A7C33A940BCB62
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 1ef850a979f946e43d7bd524fc6e33346a4d1d5a57a4684857ed0e57e57bb9a5
                        • Instruction ID: da7b5de6b3119f41ff1ead07d81efa0d93134d9ee2cd81bcf5b1703f1445840e
                        • Opcode Fuzzy Hash: 1ef850a979f946e43d7bd524fc6e33346a4d1d5a57a4684857ed0e57e57bb9a5
                        • Instruction Fuzzy Hash: B4113DB02006069FD399AB3DC840627B3E2FBC5614B348D6D91268B7A0DF75F956DBE0
                        Memory Dump Source
                        • Source File: 00000000.00000002.2386460388.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d10000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 203bd4ae10ac133663bedb0b85647f586edebe8ddcc3f857859078b78fe45d0c
                        • Instruction ID: cd0fa2556751bf9d7b01e99f379923f8b14f48fb4388282f4eed24d5429fc8fe
                        • Opcode Fuzzy Hash: 203bd4ae10ac133663bedb0b85647f586edebe8ddcc3f857859078b78fe45d0c
                        • Instruction Fuzzy Hash: 7911513AB10204ABDB14CF64E989BDDBBB5FF8C311F144565E916A7790CB71AC10CBA0
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f6f497c28e2bf277120c6ab82cbff28ced1a082d422cd6e5022ce96717a543a7
                        • Instruction ID: de6ea2ab570c56f7457f3323624eff0305830e53b243057d7e794949cd29dad2
                        • Opcode Fuzzy Hash: f6f497c28e2bf277120c6ab82cbff28ced1a082d422cd6e5022ce96717a543a7
                        • Instruction Fuzzy Hash: 3B1163B16007069FD39AAB3CC80061673E2FFC1604B348C6DD1268B7A0DB75F956DBA0
                        Memory Dump Source
                        • Source File: 00000000.00000002.2386460388.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d10000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2525ddd2e89a6319dbf9fc47a4e245c42e76440c60aeb899dcf793d9842c1539
                        • Instruction ID: 6277fc4d9f3c68270ad7fb01309efd1b61bef6a57e241b634a35af85bc50f051
                        • Opcode Fuzzy Hash: 2525ddd2e89a6319dbf9fc47a4e245c42e76440c60aeb899dcf793d9842c1539
                        • Instruction Fuzzy Hash: 93117C703007069FC340AF6AE494A2AB7D6FF89A5475440BDE60ACB7A1DF75DC06C790
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: a1fc7ddf834223f6bd525f18e69ceb878a7235faeb5b6d51e5d3710c3ba58d64
                        • Instruction ID: 78cf13382dd66cfd4f0489b372a0910e995caff5e52341eb7a4fb3c49c036b1c
                        • Opcode Fuzzy Hash: a1fc7ddf834223f6bd525f18e69ceb878a7235faeb5b6d51e5d3710c3ba58d64
                        • Instruction Fuzzy Hash: 2311C6347103009FEBA4E629C950B6A73E6EBC4710FA4C92EE8099B2C4CB75D802CB90
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391875024.0000000008950000.00000040.00000800.00020000.00000000.sdmp, Offset: 08950000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_8950000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 83a817f81026481a276112aa176c8c5f28b9e9d819fb8a60416aee50836a9c45
                        • Instruction ID: 2f339188a147fcfff2d5d617553f7ff2a05576ebbe445d92e3b4253fc936b18f
                        • Opcode Fuzzy Hash: 83a817f81026481a276112aa176c8c5f28b9e9d819fb8a60416aee50836a9c45
                        • Instruction Fuzzy Hash: AE01D472F00A265BD795FB2A9C90A7FB7EFEFC8654B15452DD465C7340EE30880283A0
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 379aac3427502d42c6961872be6649926500e8ce5b1f8db97e2d336752c729ff
                        • Instruction ID: 54e189894fc0d3ea190a218102bc4ceb98248842e5028c54a6d49e2e33467ed8
                        • Opcode Fuzzy Hash: 379aac3427502d42c6961872be6649926500e8ce5b1f8db97e2d336752c729ff
                        • Instruction Fuzzy Hash: CF112330E073008BEFB9AB35880016E7BBBDF82A25B00C9AED06A976D0C735D241CF01
                        Memory Dump Source
                        • Source File: 00000000.00000002.2386460388.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d10000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b9caa33fd495ff093473bcef9d5359ae2a02bb33bef880831631f85b520433fb
                        • Instruction ID: 26e4f069244660a134d03dd081415d8098c8b202780eb515e2c9109659d55b66
                        • Opcode Fuzzy Hash: b9caa33fd495ff093473bcef9d5359ae2a02bb33bef880831631f85b520433fb
                        • Instruction Fuzzy Hash: 48110A317007019FC724DF69E8A4A6AB7F6EF85314318896DE44AC7BA1CB61EC46CB90
                        Memory Dump Source
                        • Source File: 00000000.00000002.2386460388.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d10000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 14bebfd5a13a903986379881ae9987793eec30ad39bcce54982024e89246ed50
                        • Instruction ID: cf4f430267032f735b115e85643064fed0d43c4c5fae942cc48837bd436fc5d8
                        • Opcode Fuzzy Hash: 14bebfd5a13a903986379881ae9987793eec30ad39bcce54982024e89246ed50
                        • Instruction Fuzzy Hash: DB111975E002199BDF04DFA9D8547EEBBF1FB48700F10852AEA14B7390D774A905CBA4
                        Memory Dump Source
                        • Source File: 00000000.00000002.2386227971.000000000138D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0138D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_138d000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c71a23e6f2891b0ac880f649e89db06405e67f0af756f6891ce480dd6b8289f7
                        • Instruction ID: d845bf3722262458edb374a462325ccb212dcecb6f17884c2993bc7e4ed60d54
                        • Opcode Fuzzy Hash: c71a23e6f2891b0ac880f649e89db06405e67f0af756f6891ce480dd6b8289f7
                        • Instruction Fuzzy Hash: 8711DF72404344CFCB02DF54D5C4B16BF71FB84328F2486A9D8090B256C336D45ACBA1
                        Memory Dump Source
                        • Source File: 00000000.00000002.2386460388.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d10000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 18ec63189544868b278b1e1a4e2f10a177f6ca1f1b237cc1bfb549185fa6e3bc
                        • Instruction ID: c2165463d5327e2250320c39c751a8d34fc35df06b2bd7a2fe8f565792d18d3c
                        • Opcode Fuzzy Hash: 18ec63189544868b278b1e1a4e2f10a177f6ca1f1b237cc1bfb549185fa6e3bc
                        • Instruction Fuzzy Hash: E8018075E012089BDB08DFEAD4093EEBBF6AB89304F14D429D544B3344DB348A45CF64
                        Memory Dump Source
                        • Source File: 00000000.00000002.2386285334.0000000002C4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C4D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2c4d000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5ecdbd2196c02b2d36a90ebf2b22d30fffd8b7da1097997a33617a95b9f44a3d
                        • Instruction ID: cab9e8c5fbb8018124cf397beff7d8e7c98f24dba2a402797890949544586091
                        • Opcode Fuzzy Hash: 5ecdbd2196c02b2d36a90ebf2b22d30fffd8b7da1097997a33617a95b9f44a3d
                        • Instruction Fuzzy Hash: 2D11BB75904280DFCB12DF10D5C4B16BBA1FB84214F24C6A9DC4A4B696C33AD84ACB61
                        Memory Dump Source
                        • Source File: 00000000.00000002.2386460388.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d10000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e46f2fd2c867110e3f302b798900e2f63a8d08be9b0a3355113caa101e179d19
                        • Instruction ID: a71042713cb6ad6f428d453211cc7da71fc0853964f863d50156c8107e36c68f
                        • Opcode Fuzzy Hash: e46f2fd2c867110e3f302b798900e2f63a8d08be9b0a3355113caa101e179d19
                        • Instruction Fuzzy Hash: 5F11F575E002199BCF04DFA9D854BEEBBF5FB88710F10842AE614B7390D774A905CBA4
                        Memory Dump Source
                        • Source File: 00000000.00000002.2386460388.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d10000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2aadf618db52508b4786ab1385288a4961b00f6873d1c7aa3a6eace23991c9f5
                        • Instruction ID: 4a2bf7cd75131391e7a265e07e7973b5b4a63d54f89bfa0f554afc58946fe80a
                        • Opcode Fuzzy Hash: 2aadf618db52508b4786ab1385288a4961b00f6873d1c7aa3a6eace23991c9f5
                        • Instruction Fuzzy Hash: 3A01D872B041156FDB16DE98A844BAF3FE7DBC8650F18802AF946D7744CA75CC12DBA0
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c2e1d3d0be098a201d206d607549da948859cea8f80d92de0f387f088730e30e
                        • Instruction ID: 9ad1883e7bf780f797c62956b5d3ecc0443ad61bd9e170aaffbe54916b386067
                        • Opcode Fuzzy Hash: c2e1d3d0be098a201d206d607549da948859cea8f80d92de0f387f088730e30e
                        • Instruction Fuzzy Hash: 0901F131304200CFD724DF79E8548AABBB9AF8621170502AEF045CB3B2CA31DE84C760
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c128d111e31aa683fda8db6baadc8369ee2ab245b36192c2516267f88a0ae060
                        • Instruction ID: 90f3edc4e25de682ba9e38c19687accf42d9763f4282cc6c11e384c47415431d
                        • Opcode Fuzzy Hash: c128d111e31aa683fda8db6baadc8369ee2ab245b36192c2516267f88a0ae060
                        • Instruction Fuzzy Hash: 8111B6316107424FC7259F2ED81422B7FF2EF85324B208B5DE0AA876E1DB74A8068B90
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 609e9428272ec05bcbcdb1a8ac039b9788a86b36a89b04f7fd8662609aafb0c4
                        • Instruction ID: 0faf44d951593d9dc4549e1ecedeb040216fa39cd894d6d074a4be14843ff57a
                        • Opcode Fuzzy Hash: 609e9428272ec05bcbcdb1a8ac039b9788a86b36a89b04f7fd8662609aafb0c4
                        • Instruction Fuzzy Hash: 2E116171A002099FDF55DFA9C884AAEBBF5FF48710F144429E929D7750D730DA10CBA1
                        Memory Dump Source
                        • Source File: 00000000.00000002.2386460388.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d10000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b50869bd1ceba9b416230a43e07bb1f9b34f562328b4ab32219a2f158a3e811a
                        • Instruction ID: 12faa19b1f18d8682a96c2482f11354b519d903f69201a2d1b28eddbc7b01486
                        • Opcode Fuzzy Hash: b50869bd1ceba9b416230a43e07bb1f9b34f562328b4ab32219a2f158a3e811a
                        • Instruction Fuzzy Hash: EF115BB1C00619DBEF04DFAAD8483EEBBF1FF88304F048529D514A7290E7B84649CB91
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 55c6f02d3ae367478b1964bdc70deb4f8d19dbf9a3415b05c4ec5bf90ec5cf69
                        • Instruction ID: 4c686db1e4f170753be83e247a366205fa2e262fec7d02c7d46d04c1dc15790e
                        • Opcode Fuzzy Hash: 55c6f02d3ae367478b1964bdc70deb4f8d19dbf9a3415b05c4ec5bf90ec5cf69
                        • Instruction Fuzzy Hash: 5301D472D06A22AFE7B45F09C200225FBA8BF44B14B88422FD41893B80C771F691CFE1
                        Memory Dump Source
                        • Source File: 00000000.00000002.2386227971.000000000138D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0138D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_138d000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c09ae7a0f0eea6e2b23a1e7c979a7a009fedde1ce1c8f278a7efdae8fa0ecd41
                        • Instruction ID: 2cfcbe963f379e57d08bc5361feba393f706528e40951736f885e803169a0293
                        • Opcode Fuzzy Hash: c09ae7a0f0eea6e2b23a1e7c979a7a009fedde1ce1c8f278a7efdae8fa0ecd41
                        • Instruction Fuzzy Hash: 9C01DB71415344AAE7106B9ADDC4767BFACEF41368F18C41AED4D0A6C6C3759844C6B1
                        Memory Dump Source
                        • Source File: 00000000.00000002.2386460388.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d10000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 69325ce704d1ec5837f77f63801ab4125de053fa35776a385d47817aa32e1ac9
                        • Instruction ID: 3837574fff2ab8e5d8cadc48d17eceacf6e64f018c3a69aff5c6d2f44148340e
                        • Opcode Fuzzy Hash: 69325ce704d1ec5837f77f63801ab4125de053fa35776a385d47817aa32e1ac9
                        • Instruction Fuzzy Hash: 18F096313006115B87159A2EB858A2EBBDDEFC8A69755407BFD05CB7A1DF21DC06CB90
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 7770b5ea7f2e7d85acb61a659fe8b1ac7ac7ab54cd0f07aee59f69a55898be03
                        • Instruction ID: aea172aad5e8f545a46a597cb021c66d633637ed11366fa725b4151768d687ff
                        • Opcode Fuzzy Hash: 7770b5ea7f2e7d85acb61a659fe8b1ac7ac7ab54cd0f07aee59f69a55898be03
                        • Instruction Fuzzy Hash: 4FF0F6303051A28FEB98DA3EC848A3E3BDEAFC4A55705006DE40AC73E0DE29DD41C7A0
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2a138e93818b8f9d36301b85ade2c21473f61a4647ab0b53b43210ddf6f7f992
                        • Instruction ID: e990ee39928bf1580eccaa15c2dacf6c4e90f72be4a1a85513f8ed44908a0985
                        • Opcode Fuzzy Hash: 2a138e93818b8f9d36301b85ade2c21473f61a4647ab0b53b43210ddf6f7f992
                        • Instruction Fuzzy Hash: 4D015E71610B118FC724EB2AD44465BBBF2EB88325F208B1CF59A87695DB74A8468B90
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391875024.0000000008950000.00000040.00000800.00020000.00000000.sdmp, Offset: 08950000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_8950000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c234c0e7d9e7fe48f6e714399cc193af8e20819b30b72b872ae3e4aebbd6afdf
                        • Instruction ID: 9e75e53d9236e1c3b4108ef08bf22518284c6b1564f1603de1199dce074b3f15
                        • Opcode Fuzzy Hash: c234c0e7d9e7fe48f6e714399cc193af8e20819b30b72b872ae3e4aebbd6afdf
                        • Instruction Fuzzy Hash: 51F0A43A300209ABCF125E44EC44B9E3B76EF89721F008026FA05961A2CB719825D7A5
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 44c690ad5265dac5536f898e23f413ab282949f6e237a96e9df10c8c2331df97
                        • Instruction ID: 9b91a8bdd3b11a62f40a81d0979202e3fb34d4ef8d5b5a223d1648c06bdb18db
                        • Opcode Fuzzy Hash: 44c690ad5265dac5536f898e23f413ab282949f6e237a96e9df10c8c2331df97
                        • Instruction Fuzzy Hash: FEF021303091A14FEB559B39C85493D3BAE5F45915309009EE406CB7E1DF29CD41C7A0
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d94d90f75b769820e50289bdde9f0a7ab68dc8b621d56db3d5738a04b115eb67
                        • Instruction ID: 079d82debb315c4fc3dcd3ffadd85db4d9e8ceff0f091f39c1e5c18f316f3c79
                        • Opcode Fuzzy Hash: d94d90f75b769820e50289bdde9f0a7ab68dc8b621d56db3d5738a04b115eb67
                        • Instruction Fuzzy Hash: D6F0F0313102408FD696EA3D9880BAA3B9AAFC5620F05016EE145CB3A1DF308D46DBE2
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391875024.0000000008950000.00000040.00000800.00020000.00000000.sdmp, Offset: 08950000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_8950000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 092b6ffb7a7237ec687662379b73a234788b7abe8c0dbadb925c7f251bf70986
                        • Instruction ID: d0ed68c937e127bea9eac333e5f36b989b28f0f6eae5f9dc86cc0d45095f8581
                        • Opcode Fuzzy Hash: 092b6ffb7a7237ec687662379b73a234788b7abe8c0dbadb925c7f251bf70986
                        • Instruction Fuzzy Hash: 01018FA490E3C68FC703EB70D9652487FB09F17204F1505DBD885CF1A3EA781909DB96
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 089cbfe297152423390851a44d4e3d7e1dedede45e9c2b2de6dcb5f881edb41d
                        • Instruction ID: f25afaf3289e5d421455411df4c95e562ca11d7d819d8d745642278c44f72d6d
                        • Opcode Fuzzy Hash: 089cbfe297152423390851a44d4e3d7e1dedede45e9c2b2de6dcb5f881edb41d
                        • Instruction Fuzzy Hash: FCF06D317101058FD695E62E8840B6A76DAEFC4620F54456EE546C7390DF30DC05D792
                        Memory Dump Source
                        • Source File: 00000000.00000002.2386227971.000000000138D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0138D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_138d000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e6344632d4570ea2926eaf9273e93ea677d9d064c60f3b4c53971baacf3ee3a6
                        • Instruction ID: ca043d3476b49186a83408254f29590ace1d599d2e7263a50ee24881132d50b6
                        • Opcode Fuzzy Hash: e6344632d4570ea2926eaf9273e93ea677d9d064c60f3b4c53971baacf3ee3a6
                        • Instruction Fuzzy Hash: 39F0CD71404344AEE7109B0ACD84B62FFA8EB41328F18C45AED4D0A286C3799844CAB0
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c8e60da9e75dcc6e1bc9cbf0f83ea902114900f8700a5800e8b8c5c3530b4d8d
                        • Instruction ID: f17958bf4d332082279d5d9f06171d22e6097221b78a40a08f77d1c87bb5a931
                        • Opcode Fuzzy Hash: c8e60da9e75dcc6e1bc9cbf0f83ea902114900f8700a5800e8b8c5c3530b4d8d
                        • Instruction Fuzzy Hash: 0A01B279A00104CFDB54DF68C484998BBF1FF48325F2542A9E915AB3A0C732EE82CF90
                        Memory Dump Source
                        • Source File: 00000000.00000002.2386460388.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d10000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 98bb2f72ea29c3378bd8932d3ec9ecf3006e31a5a482d03e19dda90429d0fad1
                        • Instruction ID: bff63656e8912a7543000926651da91d5067365213c6dfd26ae375eb09ea6de3
                        • Opcode Fuzzy Hash: 98bb2f72ea29c3378bd8932d3ec9ecf3006e31a5a482d03e19dda90429d0fad1
                        • Instruction Fuzzy Hash: 30F05C32A002447BDB191A347454AFEBF52DFD0214F05452AFC85C6601DF358C22DB90
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ebe2618485185a4f970d5bd398cc2fdf6e6b921cc5c93085a511e8feeef731e6
                        • Instruction ID: 979258b46e025d3b4326e4133a09cd3fab9fcff3f53a1599a811873875ee29b7
                        • Opcode Fuzzy Hash: ebe2618485185a4f970d5bd398cc2fdf6e6b921cc5c93085a511e8feeef731e6
                        • Instruction Fuzzy Hash: 3BE0923A3002004FC3545B5DA0182B9BFABEBC5331F14016FE08AD3291CF784C424761
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 6a6f48e264e0fe64942d6559e038f93e7cfab483bb96644c204b7481cff20959
                        • Instruction ID: b44a206a4cdf5407b84b52f8ba4584af8faa372cd1db81ba8c5eb32d60f65a15
                        • Opcode Fuzzy Hash: 6a6f48e264e0fe64942d6559e038f93e7cfab483bb96644c204b7481cff20959
                        • Instruction Fuzzy Hash: 08E0923B1052546FC7024795EC05EC1BFA99B09260B09C096E1498B263C2518810EBA1
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 0c754335568e0d5b1ec86670e8e9b389cb5049ad9a11c5a6df00a3d54168eb57
                        • Instruction ID: 7387571ff47b2e96576f02a66a531ce80e2b89cf2a4a7126e781e45f1a57f53a
                        • Opcode Fuzzy Hash: 0c754335568e0d5b1ec86670e8e9b389cb5049ad9a11c5a6df00a3d54168eb57
                        • Instruction Fuzzy Hash: AAE068394201286FE302629DE840AC1FBAAE70E320F0A01C2E04443992D358DC8147A2
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 74fc1664f9333db5d4110e2e10a7cbcd55158b092e32ab2216c6d61c687d601f
                        • Instruction ID: 7214dbe4b867e9696fcbafe130c4b27c27f92076c0755e3177e7aa00fe7d8fa9
                        • Opcode Fuzzy Hash: 74fc1664f9333db5d4110e2e10a7cbcd55158b092e32ab2216c6d61c687d601f
                        • Instruction Fuzzy Hash: D5E09B37650524CBC700DB88FC40576B3E9E754B653188357E90CCAA10E33BE812C3C0
                        Memory Dump Source
                        • Source File: 00000000.00000002.2386460388.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d10000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d84dffd2540893647ec423d53d48b0b29acf190d934975e88b0689bcc97c31f8
                        • Instruction ID: ae8ea495279f835bfa3d81a9144f470d6e7d0f01aae49a6e4770395c2d0cd888
                        • Opcode Fuzzy Hash: d84dffd2540893647ec423d53d48b0b29acf190d934975e88b0689bcc97c31f8
                        • Instruction Fuzzy Hash: A2E01AB8D45209EBCB40EFA8E54939EBBF4EB48315F5489A6D948E3300EB348A55DB41
                        Memory Dump Source
                        • Source File: 00000000.00000002.2386460388.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d10000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b0abe3a8d606c8f0f295f8ea7fd4435e7bd395aee19bc48f4fe38b34e321b0e7
                        • Instruction ID: e2a6927fc7d987cf4776e29af1a2bceb38ed94ab05de1305d1211ee213197eae
                        • Opcode Fuzzy Hash: b0abe3a8d606c8f0f295f8ea7fd4435e7bd395aee19bc48f4fe38b34e321b0e7
                        • Instruction Fuzzy Hash: A8E0861234C1D90BCB4616BE18781AD6F634F8319735484B7D159CF39BCD158C568361
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 6860269c1e469ba46e094456117b3f684a8269f38e4efe95d84c1eece6704fbe
                        • Instruction ID: 6372c7af8eeaaba90ad871280a131a022777187ab2f71db800a07696178a716b
                        • Opcode Fuzzy Hash: 6860269c1e469ba46e094456117b3f684a8269f38e4efe95d84c1eece6704fbe
                        • Instruction Fuzzy Hash: 05E02635220010CFCB00E71CC588BE433A8EB4A300F5989B3F54ADB314C275A8828B80
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b92e94fd5840e87ff1e4a0ee9fd265002dc7bcdb42ad4b1207939a282431469a
                        • Instruction ID: 72f1837fc23f15614ef1216442359e0e380855f3548a50d7dd0c2f8a71c6a77c
                        • Opcode Fuzzy Hash: b92e94fd5840e87ff1e4a0ee9fd265002dc7bcdb42ad4b1207939a282431469a
                        • Instruction Fuzzy Hash: FBE0C237245214EF8B466B8A9C44CD6BFD9EB09370708C856F60E47272C6129C10EBD4
                        Memory Dump Source
                        • Source File: 00000000.00000002.2386460388.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d10000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ae621a8b62687a794c94e596429691e01c4005f773f1698b64d90560ef028d11
                        • Instruction ID: f054571ed1c0c7881a2ebe53056c3c68bfbbee7a0d8ffa03f01c90d7caaa00d4
                        • Opcode Fuzzy Hash: ae621a8b62687a794c94e596429691e01c4005f773f1698b64d90560ef028d11
                        • Instruction Fuzzy Hash: 0CE04F78D05208EFCB00EFB8A54829DBBF4AB48301F1489A6D90893300E7308A54DB41
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 0f8d29c6768dc26a8b03b193ef0b3fecb10f5e3a2805b1d15bfd39b19d7dfeaa
                        • Instruction ID: 6d2960fe43671707d93a5f355ea0a53c6e1c98dab8dbc65697d4906ba967139c
                        • Opcode Fuzzy Hash: 0f8d29c6768dc26a8b03b193ef0b3fecb10f5e3a2805b1d15bfd39b19d7dfeaa
                        • Instruction Fuzzy Hash: FAE08C30201200DFCB018B24DC00A773BB0AE5222431A8BAAF416CF1F3D22ACC42CAA0
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 550600ec2d1ef74e3c6cba40257bbba763f453e39cf08eb2eb5a6f96289b2cf6
                        • Instruction ID: 33a27ca46aa7b5e0d4c8f7eccb98cbc6c1db977ae22508646cfbb539e4e93f37
                        • Opcode Fuzzy Hash: 550600ec2d1ef74e3c6cba40257bbba763f453e39cf08eb2eb5a6f96289b2cf6
                        • Instruction Fuzzy Hash: AAD05E323001144B8608365EA41C66EFEDFEBC9632B14402BFA0AD3341CEB94C0247E5
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 36f5fd08634c083d11c7f7ded3a8f7328796efaf1a670ada5881086f58ab9ee2
                        • Instruction ID: 75310e733c730a11cc575b6258c23b6a213b0ce90f49df8e06179c23d6ccc01c
                        • Opcode Fuzzy Hash: 36f5fd08634c083d11c7f7ded3a8f7328796efaf1a670ada5881086f58ab9ee2
                        • Instruction Fuzzy Hash: 75D05E333581249FD3449BB8F848E9277ECDF48665B0940A6E20CCB661DAA2E8008790
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 0b1b82d894430c4e8d7f7a2e2ec58f3c19809060eab22a73f4dc5684969eefcb
                        • Instruction ID: 7eb8aff5ffc6233238939be094cb80ff42acbb692bc0378e0b2ac4ec212e4337
                        • Opcode Fuzzy Hash: 0b1b82d894430c4e8d7f7a2e2ec58f3c19809060eab22a73f4dc5684969eefcb
                        • Instruction Fuzzy Hash: FCD0A7213092A01F8646233C38540B92FE6CFCB06135904F7F1CAD7346CC484D0743A1
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 808eaf56c5438fb7a5bd72d7ee3a49c2e277fb3654d2a0e5a3d94ea4ec5da1db
                        • Instruction ID: 584639f15c61843e066a2a0a918a97435e4f215b989b1e1aaccd896cc5ca7f85
                        • Opcode Fuzzy Hash: 808eaf56c5438fb7a5bd72d7ee3a49c2e277fb3654d2a0e5a3d94ea4ec5da1db
                        • Instruction Fuzzy Hash: 5FE0C22171D6E15BDA8B33282C7412D2A424F83424B09169BE076EA2D2CD5C4916D38B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391875024.0000000008950000.00000040.00000800.00020000.00000000.sdmp, Offset: 08950000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_8950000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 02809a5f16b1f5c2a5ea086cc5f68818c3064cb68b15a1004760479413cdec2a
                        • Instruction ID: edbacc4ffcf7696370499ca3c9fead8e8644bba0daacc7d040831fe9a32d9676
                        • Opcode Fuzzy Hash: 02809a5f16b1f5c2a5ea086cc5f68818c3064cb68b15a1004760479413cdec2a
                        • Instruction Fuzzy Hash: 44D01270904109EBCF40EFA8E94159DBBB5EB45304B1045E9EC09D7300DA716E059FD0
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 7e54f8997d0ab03d8aa3ae5602ea4e58c348cf3bddc8f71632b5ff4e1e1f3bd5
                        • Instruction ID: 1efd99663b41023720f10747565baf941d8abee38f5689bf249d1523523da4c7
                        • Opcode Fuzzy Hash: 7e54f8997d0ab03d8aa3ae5602ea4e58c348cf3bddc8f71632b5ff4e1e1f3bd5
                        • Instruction Fuzzy Hash: 64D0C922708924935DDA3258682967D314A8F86915B06046AE51A9A7C0CE688E12D3CA
                        Memory Dump Source
                        • Source File: 00000000.00000002.2386460388.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d10000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 312b26e9ac98141efc4cdd49898d192f2ed3e5f7d9bfb64ea12955fec5915c3d
                        • Instruction ID: 680503a17b20a9f303af03dd24f5d25e654d6d5e74511c32f5198a661249d268
                        • Opcode Fuzzy Hash: 312b26e9ac98141efc4cdd49898d192f2ed3e5f7d9bfb64ea12955fec5915c3d
                        • Instruction Fuzzy Hash: 95D0673AB400189FCB049F9CEC508DDBB76FB98321B448526F915A3261CA31A921DB90
                        Memory Dump Source
                        • Source File: 00000000.00000002.2386460388.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d10000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4c49accfd4864280cfb3c25b192bd8ab2a89ad5f69b14f0a955473cea3ab0340
                        • Instruction ID: d1b8462b9225f5708a604289d9c98a00c1713d02462adac8fcae9217f873f552
                        • Opcode Fuzzy Hash: 4c49accfd4864280cfb3c25b192bd8ab2a89ad5f69b14f0a955473cea3ab0340
                        • Instruction Fuzzy Hash: 55D0C93801520A86C745F76AE889A553B2AEBD06057B48B20B9064621ADF78A9AA8694
                        Memory Dump Source
                        • Source File: 00000000.00000002.2386460388.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d10000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f6640210bffbb204713045c0f6d6fbe4e1daf2326f4877610d9bf1705428395c
                        • Instruction ID: 4ecb245ec4b5871461048fc7ceb6163724089b0cc4b08ae7bc1dba435f76abfc
                        • Opcode Fuzzy Hash: f6640210bffbb204713045c0f6d6fbe4e1daf2326f4877610d9bf1705428395c
                        • Instruction Fuzzy Hash: 49C0123800420A86C745F76AF8859153B2BABC06047708A20B40606219DF7868A687D0
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e98b0e25eee49aaa65357bdc8fa9de33772f42f5bfc5abfe49e95819a0ff59f2
                        • Instruction ID: 4a51a15528ef2336a7d0ddbdb8d596d0c81f4ea65fd5f8a9456adbf3c55f99e3
                        • Opcode Fuzzy Hash: e98b0e25eee49aaa65357bdc8fa9de33772f42f5bfc5abfe49e95819a0ff59f2
                        • Instruction Fuzzy Hash: 6ED01230500204CFC700DB68D9449117BA5EF45705324C5A9F4088F233D732EC42CA90
                        Memory Dump Source
                        • Source File: 00000000.00000002.2386460388.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d10000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e63db7cc987668b6fa9f75e8261b4a3f3d7e631e97124c0d8a328db1a81c3541
                        • Instruction ID: effe376d7d537c1e92ebd7ac5160ba3d24172c0b7cc56675a29bf153d4649f31
                        • Opcode Fuzzy Hash: e63db7cc987668b6fa9f75e8261b4a3f3d7e631e97124c0d8a328db1a81c3541
                        • Instruction Fuzzy Hash: 93C09223B0002807C60576ADF80916D6387EAC59FB32602BAD609EBB85CD6AEC0B57D1
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2386460388.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d10000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID: Xaq$`$$]q
                        • API String ID: 0-2495635447
                        • Opcode ID: 0bc4088a650b7f66f1301f3117ab9a21a40127ba66f1adf6cf7989c3aef13b77
                        • Instruction ID: 004e11251eeedbc8f1d6b6e9d488c5e00211eb4ae5ad2b54dba594b4241e1af5
                        • Opcode Fuzzy Hash: 0bc4088a650b7f66f1301f3117ab9a21a40127ba66f1adf6cf7989c3aef13b77
                        • Instruction Fuzzy Hash: 1B917F75F002189BDB08AF79A46467E7BB3BFC8714B04892DD446E7384CE34DC428B91
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391690287.0000000008200000.00000040.00000800.00020000.00000000.sdmp, Offset: 08200000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_8200000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 37d92b0d18d82692f1b2423ee97ef96a80674dca83ae08b8c6e565845cf67c22
                        • Instruction ID: 2be0705f8536af3dc40d73fed0c9a2d2aff352b23deeb16a514a51543ae5a266
                        • Opcode Fuzzy Hash: 37d92b0d18d82692f1b2423ee97ef96a80674dca83ae08b8c6e565845cf67c22
                        • Instruction Fuzzy Hash: 4F537DB0A142288BC754FB78E88869DBBB2EF89304F4185EDD149A3291DF385DC5CF56
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391690287.0000000008200000.00000040.00000800.00020000.00000000.sdmp, Offset: 08200000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_8200000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID: PH]q$PH]q
                        • API String ID: 0-1166926398
                        • Opcode ID: bcea4078cbd401aaf960277dd58846e2c9eb713bffdda3ca72190348bddebb32
                        • Instruction ID: 040b70f6ee6ab7814f2aaba6dfaae950e826427ade3ed0f8d5d4f19f10410065
                        • Opcode Fuzzy Hash: bcea4078cbd401aaf960277dd58846e2c9eb713bffdda3ca72190348bddebb32
                        • Instruction Fuzzy Hash: 38D1DA74A10605CFDB08DF69C598AA9B7F1BF4C301F2684A9E405EB3A2DB31AD41CF60
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2386460388.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d10000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID: Xaq
                        • API String ID: 0-686314484
                        • Opcode ID: 128884516488722d2c3559a8449ac2e69dae8426371613da3a29e5b1f2ed3ebe
                        • Instruction ID: 074613703c80dcd88b6ce9c16e76cae060eaf911dffba0b9eff80992647ce1db
                        • Opcode Fuzzy Hash: 128884516488722d2c3559a8449ac2e69dae8426371613da3a29e5b1f2ed3ebe
                        • Instruction Fuzzy Hash: 63B1A270B04255DBEB689F79A45433ABAE3ABC4B05F184D69D8C2D6B84CF34CC81EB51
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391056664.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c00000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d1b01f35cfab73dcf22cdeb479639b16d8122e81d9e76347c4c43f3ed897a753
                        • Instruction ID: f077462319993351919741a86bea66375369569ffd443d26c560ba7429b6e835
                        • Opcode Fuzzy Hash: d1b01f35cfab73dcf22cdeb479639b16d8122e81d9e76347c4c43f3ed897a753
                        • Instruction Fuzzy Hash: 2AA181B0B002559FDB58BBB8882477F7AA7AFC8750F148569D00ADB3D4DE389E438791
                        Memory Dump Source
                        • Source File: 00000000.00000002.2390700943.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6980000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: fddc0cb503b692f6c236095ba95d28d4c3e0f05fe3addcbc27e522680d3b9396
                        • Instruction ID: 6542e61aa5d689d3d9b24ee93b517c26867b2a949deff221460452f689a7bfe0
                        • Opcode Fuzzy Hash: fddc0cb503b692f6c236095ba95d28d4c3e0f05fe3addcbc27e522680d3b9396
                        • Instruction Fuzzy Hash: C812B0F042174A8BE398DF26E84A1C53FF2F7C5318B544319E2612A2D1DBB8558BCF65
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391190168.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c40000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: cfbb47dec9c92e9cd1c6a78a26870ac3fe53ab02f0bd569085f6d4b797480d52
                        • Instruction ID: 17953563d513c43110f5cd5e63267fa9399d1930b63cdcba7607fa23d0ada5f8
                        • Opcode Fuzzy Hash: cfbb47dec9c92e9cd1c6a78a26870ac3fe53ab02f0bd569085f6d4b797480d52
                        • Instruction Fuzzy Hash: 54D10635C2075A8BCB11EBA5D95469DF3B1FF95300F20879AE40A77250EB706ECACB91
                        Memory Dump Source
                        • Source File: 00000000.00000002.2391190168.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6c40000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4bb26b0b46f4b157e81b841d6edd6d035188665ccf9c439cf1f654c775055419
                        • Instruction ID: ec3ac91f81276c8417713f5c71b8a354448372b7bb5f2a062c785b4d0cd6f0d0
                        • Opcode Fuzzy Hash: 4bb26b0b46f4b157e81b841d6edd6d035188665ccf9c439cf1f654c775055419
                        • Instruction Fuzzy Hash: 9BD10635C2075A8BCB11EBA5D95469DF3B1FF95300F20879AE40A77250EB706ECACB91
                        Memory Dump Source
                        • Source File: 00000000.00000002.2390700943.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6980000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f72045f8e5e0b936498fdb2bf1cca9839b3fcee47f64699068d6202ace9d2af4
                        • Instruction ID: d08de4c91a70534ebdd956b72abe18cadeef16e125407f53fc06adecfaf3d836
                        • Opcode Fuzzy Hash: f72045f8e5e0b936498fdb2bf1cca9839b3fcee47f64699068d6202ace9d2af4
                        • Instruction Fuzzy Hash: E6A18032E10215CFCF45EFB5D85059EBBB6FFC5300B25856AE815AB221EB31E945CB90
                        Memory Dump Source
                        • Source File: 00000000.00000002.2390700943.0000000006980000.00000040.00000800.00020000.00000000.sdmp, Offset: 06980000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6980000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 55714250351e58ea91bc2ba53124191624dca8edc47cc6dc9ff3515bf536e0ed
                        • Instruction ID: 83900bcc74a0f0db6bc51b10de36f7c9e1fadefa586f1d64750348b6c659d34b
                        • Opcode Fuzzy Hash: 55714250351e58ea91bc2ba53124191624dca8edc47cc6dc9ff3515bf536e0ed
                        • Instruction Fuzzy Hash: 9FC117B082174A8BD798DF26E84A1C97FB2FBC5318B544319E1612B2D0DFB8548BCF65
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2386460388.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d10000_K59gVXTgGv.jbxd
                        Similarity
                        • API ID:
                        • String ID: \;]q$\;]q$\;]q$\;]q
                        • API String ID: 0-2351511683
                        • Opcode ID: 9a82e24aea35eebbc3fdfefc7449be30ef2be0316bfd541fc2146e6912cb3731
                        • Instruction ID: a67fb2863319ebdbf5ccde774dac14d7cbe1f3cd4369e9f528fdefb74200cbf1
                        • Opcode Fuzzy Hash: 9a82e24aea35eebbc3fdfefc7449be30ef2be0316bfd541fc2146e6912cb3731
                        • Instruction Fuzzy Hash: 3C018F71710015AFCB6C8E7EE484A3E77E6AF8AB68725816BE445CB760DB30DC45C750
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.3262058060.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_1140000_Google Chrome sandbox.jbxd
                        Similarity
                        • API ID:
                        • String ID: (o]q$(o]q$(o]q$,aq$,aq$,aq$,aq$Haq
                        • API String ID: 0-2006068749
                        • Opcode ID: 2707c8d32e984fd51ff07d17751eef1b0fa78411aa3971e22b26688d0e0b1a4f
                        • Instruction ID: 0645ee66ad9705943b956fea0ed91247b8edb2af6585fdf982a2aab5acc074ed
                        • Opcode Fuzzy Hash: 2707c8d32e984fd51ff07d17751eef1b0fa78411aa3971e22b26688d0e0b1a4f
                        • Instruction Fuzzy Hash: ACA27F70A002198FDB19DF69C884AAEBBF2FF89B04F158469E545EB365DB30DC41CB91
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.3262058060.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_1140000_Google Chrome sandbox.jbxd
                        Similarity
                        • API ID:
                        • String ID: 8aq$8aq
                        • API String ID: 0-1589283582
                        • Opcode ID: 6d773711576e96fdc835a6cf90f23e461444ff0675a2cbca55002cf403baafc7
                        • Instruction ID: 738f992ebf7814a2747c32d072bcaa029ae31baa6cd09d65ad9c44ece5c83a2b
                        • Opcode Fuzzy Hash: 6d773711576e96fdc835a6cf90f23e461444ff0675a2cbca55002cf403baafc7
                        • Instruction Fuzzy Hash: 51B1C374E04258CFDB14CFA9C994B9DBBB2BF89300F2481A9E409BB265DB306985CF41
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.3262058060.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_1140000_Google Chrome sandbox.jbxd
                        Similarity
                        • API ID:
                        • String ID: Haq$Haq
                        • API String ID: 0-4016896955
                        • Opcode ID: 207da280910e8dfce0ef9c12961d4da151f09a4b2345e4e37fcdbbd88eb1769c
                        • Instruction ID: 4c19ef558bbb7d34f9be7bf886679eba1a668ce39cfdb84b118f49054b590878
                        • Opcode Fuzzy Hash: 207da280910e8dfce0ef9c12961d4da151f09a4b2345e4e37fcdbbd88eb1769c
                        • Instruction Fuzzy Hash: 23A1AD3070021A9FDB49AF68C899B6E7BA7EB88751F148428F506DB381CF74DD46CB91
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.3262058060.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_1140000_Google Chrome sandbox.jbxd
                        Similarity
                        • API ID:
                        • String ID: (o]q
                        • API String ID: 0-794736227
                        • Opcode ID: fb8497c0bab981daed6d05b953c414154ec8e5d1166da7e3e25445cc3331dc4a
                        • Instruction ID: 90c5a871b589606315ca64a6d5d226de1734944941fa3077f0397a5318c71ce5
                        • Opcode Fuzzy Hash: fb8497c0bab981daed6d05b953c414154ec8e5d1166da7e3e25445cc3331dc4a
                        • Instruction Fuzzy Hash: FFD11C75A10215CFCB09CFACC9849AEBBF6FF89710B198459E515AB3A1CB35EC41CB50
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.3262058060.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_1140000_Google Chrome sandbox.jbxd
                        Similarity
                        • API ID:
                        • String ID: (o]q
                        • API String ID: 0-794736227
                        • Opcode ID: 35ec3f5395bf4ae7c55e5ff85abb17104f3e22c9a88df68b127069856dd99781
                        • Instruction ID: 3d6109fabaa87b08bb27e39f14a94436bf8d5fc9566ef3b4ed39d3ac6e4cdf85
                        • Opcode Fuzzy Hash: 35ec3f5395bf4ae7c55e5ff85abb17104f3e22c9a88df68b127069856dd99781
                        • Instruction Fuzzy Hash: FC41BF357002059FCB199F69D854AAEBBF6FBCCA10F244469E906E7391CF309C02CBA1
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.3262058060.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_1140000_Google Chrome sandbox.jbxd
                        Similarity
                        • API ID:
                        • String ID: 8aq
                        • API String ID: 0-538729646
                        • Opcode ID: 34c2bf25a63528c37a744c979a6d3efa6c1b4ff2ac890a5ed77dd58242dbe115
                        • Instruction ID: d3661ba89a96975b8fb88b94a2b2a1d4fa309eaed1fa4fa4ce5e0b3484f9831d
                        • Opcode Fuzzy Hash: 34c2bf25a63528c37a744c979a6d3efa6c1b4ff2ac890a5ed77dd58242dbe115
                        • Instruction Fuzzy Hash: 193104B4D052499FDB08DFAAD544AEEBBF2BF89300F24846AE804B7360D7355A46CF51
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.3262058060.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_1140000_Google Chrome sandbox.jbxd
                        Similarity
                        • API ID:
                        • String ID: 8aq
                        • API String ID: 0-538729646
                        • Opcode ID: 79195ddfb58f18843e97215a3554ad2d081b8b165c7b9d3074de6eebd050a7bb
                        • Instruction ID: 62a14bdb2f02cdcec79ff5bfce162c6082a0df0b7f0b1ab079af24e179fe78d8
                        • Opcode Fuzzy Hash: 79195ddfb58f18843e97215a3554ad2d081b8b165c7b9d3074de6eebd050a7bb
                        • Instruction Fuzzy Hash: 21110175D0529BEFCF01CFB8D4445ADBFB1EF01215F2042AAE460AB292D730A646DB42
                        Memory Dump Source
                        • Source File: 0000000A.00000002.3262058060.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_1140000_Google Chrome sandbox.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 75371c568e5b84f1122acd9488333ad0e3d8ab5c6955de30e99671b81385722e
                        • Instruction ID: 56b46bece701fb64747930106a4a305c02b61073da5a3f910eb609fc7aa930c2
                        • Opcode Fuzzy Hash: 75371c568e5b84f1122acd9488333ad0e3d8ab5c6955de30e99671b81385722e
                        • Instruction Fuzzy Hash: B061AC343002058FDB599B78C49873E7AE7AF88B54F198629E586CB391DF34DC42CB91
                        Memory Dump Source
                        • Source File: 0000000A.00000002.3262058060.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_1140000_Google Chrome sandbox.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2bf5d9508dee2a30a428c122b01d7dc6174d1b89f566bb08622c7eaf9f2e4bd8
                        • Instruction ID: 87515a5e5a3803ebda16d5165c980aeaf71c7803b0a08a4a1b900021ddd885da
                        • Opcode Fuzzy Hash: 2bf5d9508dee2a30a428c122b01d7dc6174d1b89f566bb08622c7eaf9f2e4bd8
                        • Instruction Fuzzy Hash: E951E374D00249DFDB18DFA9D4487EDBBF1BF88305F24842AD415A6290DB785A85CF51
                        Memory Dump Source
                        • Source File: 0000000A.00000002.3262058060.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_1140000_Google Chrome sandbox.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: afffa10906816f5a74d812a92316f70c4ab7851736a107467aec063ae6e7b85c
                        • Instruction ID: dfbdeb4b4ded7559fad1c850b295bdfb43095f405a148c3423bff5bcedca20dc
                        • Opcode Fuzzy Hash: afffa10906816f5a74d812a92316f70c4ab7851736a107467aec063ae6e7b85c
                        • Instruction Fuzzy Hash: 7B316D343002099FCB0A9F69E445BAE7BA2FB88710F144029F9069B351CB75DD26CB91
                        Memory Dump Source
                        • Source File: 0000000A.00000002.3262058060.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_1140000_Google Chrome sandbox.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ec54e04822152d7610e8c3bea42c7a8175a7275413c4748f079b50702ca93989
                        • Instruction ID: 918aa662e8f5601523e2b4960d640d9542495b5e7f96b9accde9ea4b59070ea1
                        • Opcode Fuzzy Hash: ec54e04822152d7610e8c3bea42c7a8175a7275413c4748f079b50702ca93989
                        • Instruction Fuzzy Hash: 1821F0357006218BD7299B29D898A2EBBA3EFC5A517194179E94ADB390CF34DC03CBC1
                        Memory Dump Source
                        • Source File: 0000000A.00000002.3262058060.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_1140000_Google Chrome sandbox.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 299108d7a7c7e0119e81be793e842335f4f9297a8591057c01cba278283603b7
                        • Instruction ID: d37084fa1f0585b5fcf950074643e72ae50c439296a655eac73cf36586e0fc98
                        • Opcode Fuzzy Hash: 299108d7a7c7e0119e81be793e842335f4f9297a8591057c01cba278283603b7
                        • Instruction Fuzzy Hash: 27213BB4E012099FDB08DFAAD4487EEBBF6BB89310F14902AD411B7290DB385A45CF64
                        Memory Dump Source
                        • Source File: 0000000A.00000002.3262058060.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_1140000_Google Chrome sandbox.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 1ad9b40de6fc66d2d61495ecaca8de28fbf66669433e22c90884f4a4047417c4
                        • Instruction ID: 70f22c60bc31bd9c43fc948d8f159ef2b733b01c1a90332a91fec4caa30ced52
                        • Opcode Fuzzy Hash: 1ad9b40de6fc66d2d61495ecaca8de28fbf66669433e22c90884f4a4047417c4
                        • Instruction Fuzzy Hash: 2E21D5313042489FDB099F69E459B6B7BB2EB84710F144039F9069B391CB78DD16CBA2
                        Memory Dump Source
                        • Source File: 0000000A.00000002.3262058060.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_1140000_Google Chrome sandbox.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b4c392d283267fc7bf865036c5bcbee9ca8eec61d2156cac31b0b0cfd150ac41
                        • Instruction ID: 18d597913b1a48c594591e208c2d7b4797a8512edf22acb569f1d77593bd48ef
                        • Opcode Fuzzy Hash: b4c392d283267fc7bf865036c5bcbee9ca8eec61d2156cac31b0b0cfd150ac41
                        • Instruction Fuzzy Hash: 3F211874D002089FDB08DFAAD848BEDBBF1AF8A310F149029E405BB3A1DB745945CF54
                        Memory Dump Source
                        • Source File: 0000000A.00000002.3262058060.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_1140000_Google Chrome sandbox.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c1dd77b6ff4e16f2718ab950e4a10a7543bc1d270ee1a02814237265d937692c
                        • Instruction ID: 44e2d829004619219061123c72091c6ff998784f90d3ee6439e7232747f3312b
                        • Opcode Fuzzy Hash: c1dd77b6ff4e16f2718ab950e4a10a7543bc1d270ee1a02814237265d937692c
                        • Instruction Fuzzy Hash: DE11E3357006118BD7299B2AD898A2EBBA7FFC5A557194078E546DB390CF20DC03C7D0
                        Memory Dump Source
                        • Source File: 0000000A.00000002.3262058060.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_1140000_Google Chrome sandbox.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: bccb05694d3ee86f0c44f7659e9d28c72b6d94148c5bb4f20f29a3389f8cc99b
                        • Instruction ID: abd9196848c9090e9d02c160eb825fd5ae15da1f84aae2ad7ad9960c6b152c16
                        • Opcode Fuzzy Hash: bccb05694d3ee86f0c44f7659e9d28c72b6d94148c5bb4f20f29a3389f8cc99b
                        • Instruction Fuzzy Hash: 9C114C367002049FDB148F65DC89BDEBBB6BB8C710F148029E916A7390CB71AD15CBA0
                        Memory Dump Source
                        • Source File: 0000000A.00000002.3262058060.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_1140000_Google Chrome sandbox.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 33d7af714ef5f68bc23fa58b1a7801eab5f5d924bed91faa20d0d0194e7e6115
                        • Instruction ID: fa692cd08fbcf7e3964396e5973cf15fbc86e0cf56dcf1b62f01b543f585e8a1
                        • Opcode Fuzzy Hash: 33d7af714ef5f68bc23fa58b1a7801eab5f5d924bed91faa20d0d0194e7e6115
                        • Instruction Fuzzy Hash: AD11C2703006018FC3589E7ED09061AB7D6FF89A4071540BEE20ADB3A2DF72DC05C792
                        Memory Dump Source
                        • Source File: 0000000A.00000002.3262058060.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_1140000_Google Chrome sandbox.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 91e9a472a0eb46ea83469d53044fd8ccd9adb2d0e8af410dd4746812674c1bbe
                        • Instruction ID: 75324f58a5cffd4c1f499382c80ea69660b9ad3d709a9e7a71dbcd34131edba9
                        • Opcode Fuzzy Hash: 91e9a472a0eb46ea83469d53044fd8ccd9adb2d0e8af410dd4746812674c1bbe
                        • Instruction Fuzzy Hash: 86115E703046048FD728CF6EE894A27B7F6EFC9618314896DE54AC76A1CB71EC46CB41
                        Memory Dump Source
                        • Source File: 0000000A.00000002.3262058060.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_1140000_Google Chrome sandbox.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 48c68b0e28474e5f19a1de27419bf359863ea512146e2baa2c93c585b4136332
                        • Instruction ID: 9f7e63a4427bc3c6ddb5d0346ff9f44466f1a384b264367aeefa2fc8fb83d85f
                        • Opcode Fuzzy Hash: 48c68b0e28474e5f19a1de27419bf359863ea512146e2baa2c93c585b4136332
                        • Instruction Fuzzy Hash: 9F11F372E002199FDB04DFAAD840BEEBBF5FB89700F14802AE614B7390D7746905CBA1
                        Memory Dump Source
                        • Source File: 0000000A.00000002.3262058060.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_1140000_Google Chrome sandbox.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: befa0bc3e7d0cda641a610caa1b2e02dd0cb1ef25075d8d604a4776d83ed61f3
                        • Instruction ID: 0aadff11de4ba0d6af3e27e9ee4a035ed2621e11e8292ca0856080bc6f8ad9b7
                        • Opcode Fuzzy Hash: befa0bc3e7d0cda641a610caa1b2e02dd0cb1ef25075d8d604a4776d83ed61f3
                        • Instruction Fuzzy Hash: 25112271E002198BCF08DFAAD840BEEBBF5FB89700F10802AE614B7390D7746905CBA0
                        Memory Dump Source
                        • Source File: 0000000A.00000002.3262058060.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_1140000_Google Chrome sandbox.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: fe35e81ff023de483b6477fd4c2c4b1d0206861dfbed0bde0ac298ea68a1df0f
                        • Instruction ID: 76c143984fc9dff511a64e2b4920e6b06c7aa37c03e5639fb5af6ff3a4c59820
                        • Opcode Fuzzy Hash: fe35e81ff023de483b6477fd4c2c4b1d0206861dfbed0bde0ac298ea68a1df0f
                        • Instruction Fuzzy Hash: 81111BB5D00259DFEF04DFAAD8493EDBBF5FB88305F048429D110A6290E7B85249CB91
                        Memory Dump Source
                        • Source File: 0000000A.00000002.3262058060.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_1140000_Google Chrome sandbox.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c43d1255db3b0c99af1ac646a7d4c0aaeeb016e4445ac88c3eebbc8870b8c750
                        • Instruction ID: ba51da9339821264d03170251879822de3da2432e7cf56897021919b807a7d26
                        • Opcode Fuzzy Hash: c43d1255db3b0c99af1ac646a7d4c0aaeeb016e4445ac88c3eebbc8870b8c750
                        • Instruction Fuzzy Hash: 06F0E2713006049BD304DF6AE880B1ABBE9FF85B50B18406AE609DB352DB32EC05C7A6
                        Memory Dump Source
                        • Source File: 0000000A.00000002.3262058060.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_1140000_Google Chrome sandbox.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c0aface5b949d5780e1400be1a94ae2f35c3efdb16cdac159a628ffcb84a1481
                        • Instruction ID: e7c40b2eeee99c4d3a0de9fd8b92185a97fe874b25a3f2e3c9afad824f8855dc
                        • Opcode Fuzzy Hash: c0aface5b949d5780e1400be1a94ae2f35c3efdb16cdac159a628ffcb84a1481
                        • Instruction Fuzzy Hash: B2F01C74D09288AFDB04DFB9A5892DCBFB0AB4E311F1485A6A944E6260D7304A469B41
                        Memory Dump Source
                        • Source File: 0000000A.00000002.3262058060.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_1140000_Google Chrome sandbox.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b5e55741b7287010cc82449517de0de007d34d54ad774078041e1ae25ad135fd
                        • Instruction ID: 6efd267c8ed1b931688009d26b49afaffd7124d8d5e93cfd9dc7aaa0d0b3523b
                        • Opcode Fuzzy Hash: b5e55741b7287010cc82449517de0de007d34d54ad774078041e1ae25ad135fd
                        • Instruction Fuzzy Hash: 1DE086227091D90FCB472ABE587815E6F325B8259735444B7D145CF39BCE158C06C3A1
                        Memory Dump Source
                        • Source File: 0000000A.00000002.3262058060.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_1140000_Google Chrome sandbox.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c524d4e7a8c8b81510d71883d1185167bdaad2c4b9dce92307ed273f8674b932
                        • Instruction ID: d90b8900bda47623c7337b8ed8cf6dc7e2cfe385dcac7e65103e5a0d62c4efc6
                        • Opcode Fuzzy Hash: c524d4e7a8c8b81510d71883d1185167bdaad2c4b9dce92307ed273f8674b932
                        • Instruction Fuzzy Hash: F7E04F74D0520CEFCB04EFB9A54829CBBF4AB49301F1485A5A808A3210E7705A84CB41
                        Memory Dump Source
                        • Source File: 0000000A.00000002.3262058060.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_1140000_Google Chrome sandbox.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: deddb7d9b7df720d5d2f499d294472da678d479ee9e6009fe3751258f2b00c2b
                        • Instruction ID: 9e628a4ebf9b9b3524f3af8bfe4444389b6b7708bc761065f56e025193a28ae9
                        • Opcode Fuzzy Hash: deddb7d9b7df720d5d2f499d294472da678d479ee9e6009fe3751258f2b00c2b
                        • Instruction Fuzzy Hash: A6D0673AB401199FCB059F9CEC508DDFB76FB98321B448526F915A3261CA319921DB90
                        Memory Dump Source
                        • Source File: 0000000A.00000002.3262058060.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_1140000_Google Chrome sandbox.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: abc2afc853149b77fc584fe1cdd4498b0b243595050c0a24beed872cce1f081d
                        • Instruction ID: 2e1f934c23fe473e33f340377225b61b0c6be875c11772edb72e6b6b36449842
                        • Opcode Fuzzy Hash: abc2afc853149b77fc584fe1cdd4498b0b243595050c0a24beed872cce1f081d
                        • Instruction Fuzzy Hash: 05D0A93000020A4ACF00F7AAF882A5A7B6AEB80200B748E10B0060B209DEB8689B8790
                        Memory Dump Source
                        • Source File: 0000000A.00000002.3262058060.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_1140000_Google Chrome sandbox.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c84ff54ab93dd7da7df57bf6a837db00d150704bda5378e7a47631de55502bbb
                        • Instruction ID: 5e7b03d068d2d6d6ddb242e613d4c29b5bcc6f5d1d1e8cb273c2074348e00b6d
                        • Opcode Fuzzy Hash: c84ff54ab93dd7da7df57bf6a837db00d150704bda5378e7a47631de55502bbb
                        • Instruction Fuzzy Hash: 46C0123400420A46CF45F7BAF885A19776BEBC0204B709E11B4060B159DEB8599B87D0
                        Memory Dump Source
                        • Source File: 0000000A.00000002.3262058060.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_1140000_Google Chrome sandbox.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 3efde89566fc3df294698e0e1622c31a8a8e71e9abaa8dd29ea72ea0f77f86d6
                        • Instruction ID: 6758ed4ad026dbe957305abad7454275345f0beccca8416df1bea03c73c61843
                        • Opcode Fuzzy Hash: 3efde89566fc3df294698e0e1622c31a8a8e71e9abaa8dd29ea72ea0f77f86d6
                        • Instruction Fuzzy Hash: A6C09B2370002407860565BDF40516D53C7D6C55F731511BBD608E7745CD579C0747D1
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.3262058060.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_1140000_Google Chrome sandbox.jbxd
                        Similarity
                        • API ID:
                        • String ID: 4']q$4']q$4']q$t
                        • API String ID: 0-4245401686
                        • Opcode ID: 1632155ba16f5c30a66429cc30f3cb8e803cea2db99e286fb7d2b488c00d0c86
                        • Instruction ID: a5f9fb06d89de249bdfd0c218be4a8c0632eb1a181755135f5601acf0545ac89
                        • Opcode Fuzzy Hash: 1632155ba16f5c30a66429cc30f3cb8e803cea2db99e286fb7d2b488c00d0c86
                        • Instruction Fuzzy Hash: A121BF30E042499FDB05EF78E45039D7FF1EB46308F2449A9D0489B352DF799A1A8B52